<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: L0WK3Y | Infophreak</title>
    <description>The latest articles on DEV Community by L0WK3Y | Infophreak (@l0wk3y).</description>
    <link>https://dev.to/l0wk3y</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F708162%2F2145bb8b-a5fa-4620-9c98-ee84032c51ed.gif</url>
      <title>DEV Community: L0WK3Y | Infophreak</title>
      <link>https://dev.to/l0wk3y</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/l0wk3y"/>
    <language>en</language>
    <item>
      <title>How I Landed A Job In Cyber Security With No Professional Experience, Certifications, Nor A Degree</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Mon, 08 Aug 2022 17:27:00 +0000</pubDate>
      <link>https://dev.to/l0wk3y/how-i-landed-a-job-in-cyber-security-with-no-professional-experience-certifications-nor-a-degree-2doc</link>
      <guid>https://dev.to/l0wk3y/how-i-landed-a-job-in-cyber-security-with-no-professional-experience-certifications-nor-a-degree-2doc</guid>
      <description>&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fiaansec.com%2Fassets%2Fimg%2FShieldFinal.png" width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  How I Landed A Job In Cyber Security With No Professional Experience, Certifications, Nor A Degree.
&lt;/h1&gt;

&lt;h2&gt;
  
  
  About Me
&lt;/h2&gt;

&lt;p&gt;Before I get into the main discussion, I want to introduce myself. My name is Jonathan and I am currently working as a Malware Prevention Reverse Engineer at Bank of America. I also have my brand (&lt;em&gt;IAANSEC&lt;/em&gt;) and work as a security consultant/freelancer for other companies in my spare time because I believe one should always have a side hustle, especially in today's economy. I've been studying cyber security full-time for the past 4 years starting in 2019. I mainly studied on platforms such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;TryHackMe&lt;/li&gt;
&lt;li&gt;HackTheBox&lt;/li&gt;
&lt;li&gt;PicoCTF&lt;/li&gt;
&lt;li&gt;Crackmes.one&lt;/li&gt;
&lt;li&gt;Udemy&lt;/li&gt;
&lt;li&gt;and more!&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  College Era
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fumbc.och101.com%2Fshared%2Fimages%2Flogos%2Fumbc-logo.png" width="800" height="184"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Like many others in this field, I grew up being very curious and loved learning. My interest in Cyber Security peaked in my senior year of high school. After graduating high school in 2016 I realized I wanted to get into Cyber Security as a career, but wasn't entirely sure where to begin. So for about a year I did some research in the field and learned a bit about Penetration Testing on Udemy and studied CompTIA study guides. Although during this time, I was working in retail full-time and proceeded to do so for the next 6 years. &lt;/p&gt;

&lt;p&gt;Working in retail was dreadful, but the one thing that got me through the day was looking forward to going home and studying. I enjoyed the material that I was learning, once I got home around 11 pm after work, I stayed up and studied until 4/5 am. For about a year I spent my time studying the CompTIA study guides. I also had no intention of taking the exam for any of the CompTIA certifications because &lt;em&gt;1. I could not afford to spend that much money at the time and 2. I was still deciding which path in security I wanted to pursue.&lt;/em&gt; Around August of 2017 I was pressured into enrolling in college by my parents. &lt;/p&gt;

&lt;p&gt;At the time my parents persuaded me that college was the best way to land the career I was aiming for. Since I did not have any other ideas on how to land a career in the Cyber Security field, I reluctantly agreed to enroll in college. Only a few months into college I knew this wasn't for me and this couldn't have been the BEST way to get into the security field... So I dropped out, this event was a decision and a life lesson I will never forget. At that point, I learned not to take advice from anyone as a final say so, I learned to ALWAYS come to my own conclusions. Some may ask if I regret dropping out of school, but I think dropping out of school was the best decision I've ever made.&lt;/p&gt;




&lt;h2&gt;
  
  
  Coding Bootcamp Era
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FFgOS8Rz.png" width="500" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that I was no longer in college I needed a plan because I refused to be stuck in retail. 2 years have gone by since I dropped out of college, and I started to take studying more seriously while still working in retail. There were days when I would bring my laptop to work and study on my lunch break. One day sometime in April, a Youtube ad showed up mentioning a &lt;em&gt;Coding Bootcamp&lt;/em&gt;. Desperate, I did lots of research on coding boot camps and found a Bootcamp called &lt;em&gt;Kenzie Academy&lt;/em&gt;. &lt;/p&gt;

&lt;p&gt;I can't remember why exactly I chose this Bootcamp over others, but I did. Although Kenzie was my final choice for a coding Bootcamp, almost all coding boot camps are advertised the same &lt;em&gt;"You don't owe us anything until you find a job!"&lt;/em&gt;. ISA or &lt;a href="https://www.ramseysolutions.com/debt/income-share-agreements" rel="noopener noreferrer"&gt;Income Share Agreement&lt;/a&gt; was the biggest selling point for me when looking into a coding Bootcamp. Unfortunately, at the time Cyber Security boot camps weren't offering ISA and were very expensive. So I decided to settle with going to a coding Bootcamp instead since I figured I'd need to learn how to code anyways, I needed a solid foundation for learning how to code and there was potential for landing a job afterward. &lt;/p&gt;

&lt;p&gt;The software development program was divided into two 6 month segments, the &lt;em&gt;Front End&lt;/em&gt; and &lt;em&gt;Back End&lt;/em&gt; courses. Fast forward to January 2020, I completed the Front End portion of the coding Bootcamp and it was a challenging journey. I learned a lot and also felt I learned enough to continue my studies in security, and apply what I learned from Kenzie to start creating my own projects for my portfolio. At the time I felt very confident about being able to at least land a development job, but months and soon 2 years started to go by after graduating from the front-end portion of the coding Bootcamp. After 2 years had passed, I still wasn't able to find a job in software development, not even land an internship.&lt;/p&gt;




&lt;h2&gt;
  
  
  Full-Time Study Era
&lt;/h2&gt;

&lt;p&gt;During this time I was desperate to get into the field and wanted nothing more than to work in Cyber Security. I left the retail job I was working because I could no longer tolerate the toxic work environment I was working in. So I decided to study full-time and build up my LinkedIn network. During this time I transitioned from primarily studying Udemy courses to focusing on CTF sites like TryHackMe and HackTheBox. I practiced on these sites for hours a day on top of building my LinkedIn network and applying to jobs until I burned myself out and had to take breaks. I've learned so much about Cyber Security during this time, but I realized that I still don't know what position within security I wanted to pursue. So I did research into the different positions in Cyber Security.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7gwox4us9ban4e4t2xqm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7gwox4us9ban4e4t2xqm.png" alt="img" width="597" height="418"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While researching, I started to go down a rabbit hole looking into the different roles in the security field. Eventually, I came across Incident Response and did more research into the different roles within an Incident Response team and I came across, &lt;em&gt;"Malware Analysis"&lt;/em&gt; the title alone piqued my interest. After looking more into Malware Analysis, I knew this was the role for me. Once I made my decision, I focused all my efforts on learning Malware Analysis. I started by studying all of the Malware Analysis content available on TryHackMe then bought a few books on the topic such as &lt;em&gt;"Practical Malware Analysis"&lt;/em&gt; by Michael Sikorski and Andrew Honig, &lt;em&gt;"Malware Analyst's Cookbook&lt;/em&gt;" by Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard and more. &lt;/p&gt;

&lt;p&gt;I even bought a few Paul Chin courses on Udemy, with all of this material I felt more than confident enough to learn everything I could about Malware Analysis. A year goes by while studying full time, building up my LinkedIn network, and applying to jobs in the IT and Security fields. By this time I've acquired 1000+ connections on LinkedIn and felt confident that I'd be able to get some help from others in the community. I participated in security Discord servers, LinkedIn Cyber Security Livestream events, and more. Eventually, I started connecting with others that were also interested in Malware Analysis to exchange resources and other information to help me get a better understanding of the topic. &lt;/p&gt;

&lt;p&gt;In late 2021, I received a connection from the President and Chief Revenue Officer of my first client as a freelancer. This was where I sort of had my initial break into Cyber Security as a content developer. My duty was to &lt;em&gt;develop content for the clients' Cyber Security training platform which is used to educate its users on various cybersecurity topics. My main focus is dealing with malware analysis, computer science, and reverse engineering.&lt;/em&gt; Admittedly, this role wasn't something I wanted to do full-time, non the less, it still provided me an income and professional experience I could use on my resume. Things were starting to look up with this new role, sure the income wasn't stable but it was definitely enough to keep me on my feet while gaining valuable experience.&lt;/p&gt;




&lt;h2&gt;
  
  
  Doors Start Opening
&lt;/h2&gt;

&lt;p&gt;It is now the year 2022, and it's time to start fresh. I am still working as a freelancer and on the hunt for full-time work. At this point I am fully confident that I have what it takes to land a full-time role, it's just a matter of a company being willing to take a chance on me. For about a year now, I've applied to multiple Security Researcher roles as I feel they align with my experiences the most. My main technique for finding jobs is not to search for terms such as &lt;em&gt;" Entry Level Security", "Entry Level Cyber Security Jobs"&lt;/em&gt; or any generic search queries like those, instead, my approach was to base my search on skills that I've learned during my studies. &lt;/p&gt;

&lt;p&gt;For example, since the career I was aiming for was to become a Malware Analyst, I'd search for some of the tools used in Malware Analysis. So my search queries would be &lt;em&gt;"x64dbg"&lt;/em&gt; or "Ghidra" since Malware Analysis was already kind of a niche role in security I could just search &lt;em&gt;"Malware Analysis"&lt;/em&gt; or &lt;em&gt;"Reverse Engineering"&lt;/em&gt; and sift through the results for job listings that best match my experiences. &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fabq8wn0cye9jvatz8szn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fabq8wn0cye9jvatz8szn.png" alt="img" width="800" height="1404"&gt;&lt;/a&gt;&lt;br&gt;
Once I find a role that I'm interested in, I will reach out to a recruiter at the company and inquire about the position to show my interest. Here's an example of the inquiry that I'll send the recruiter &lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

Hello &amp;lt;RECRUITER NAME&amp;gt;,

I hope all is well, my name is Jonathan I am a Security Researcher I came across your job posting for a &amp;lt;JOB POSTING&amp;gt; at the company and was hoping I could chat with you to express my interest in the position. I look forward to connecting with you!

Thank you


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;This technique has gotten me a lot of initial calls which led to interviews. I've been in a dozen interviews, some of which where I've gotten to the selection process but unfortunately was not selected. Even though I was not selected for some of the roles that I applied for, there was one interview that led to a great opportunity. Binary Defense reached out to schedule an interview, during this interview I had a great chat with Randy, the Vice President of Threat Hunting and CounterIntelligence at the company. Unfortunately, I was not qualified enough for the role but Randy was hosting a class on Reverse Engineering and he asked if I'd be interested in volunteering to be a teaching assistant for that class. Here is the course description &lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

"This class is designed for technical security personnel who wish to gain skills in reverse-engineering malicious software for Windows operating systems. Although no prior experience is required to take the class, students who have some programming experience in C or another language will find it easiest to participate fully. The class will focus on disassembly analysis of compiled 32-bit DLL files written in C but may also touch on scripting languages such as PowerShell and Visual Basic that are used to deliver compiled malware payloads. Students will learn practical analysis and report writing techniques to pull the most useful information out of malware that can help inform threat hunting and detection engineering efforts and communicate that information effectively."

- Using Microsoft Windows 11 Developer VM (free) and Visual Studio 2022 (free), write and compile a very simple DLL file for Windows in C that writes content to a file on disk.
- Run DLL files from the command line using rundll32.
- Using IDA Free 7, perform static code analysis of a very simple DLL file and explain its purpose.
- Using x32dbg, set breakpoints and step through running the
instructions of a simple DLL file via rundll32.
- Create a Microsoft 365 Developer Tenant (free) for testing MS Teams, etc.
- Use vcpkg to install static libraries for Libcurl and cJSON in Visual Studio 2019.
- Modify the C code of a simple DLL project to send a simple message through Microsoft Teams via a webhook URL.
- Using IDA Free and x32dbg, analyze the new version of the DLL and find the instructions responsible for network connections.
- Using C source code provided by the instructor, modify the DLL project to be a typical Remote Access Trojan (RAT) capable of running commands, listing files and processes, and reporting the output to a Command-and-Control server.
- Modify the DLL to allow execution using rundll32, regsvr32, and msiexec.
- Using IDA Free and x32dbg, analyze the relevant portions of the RAT to identify the main command loop, commands recognized, network connections, and behavior-based indications of compromise that could be used by threat hunters and security engineers.
- Write a tactical malware analysis report, focusing on actionable details.
- Provide constructive feedback to other students about their
malware analysis report.
- Analyze another student’s version of the DLL with a few minor modifications and identify the relevant changes in functionality added by the other student.
- Using strings and FLOSS, extract strings from a compiled executable file.
- Using Python and C source code provided by the instructor, modify the DLL file to XOR encode some of the strings in the DLL project.
- Using IDA Free, analyze the XOR decoding function in another
student’s DLL to find the key bytes and decode the encoded strings.
- Using C code provided by the instructor, modify the DLL project to detect when it is being run in a virtual machine or debugger, causing the DLL to modify its behavior when analyzed.
- Using IDA Free and x32dbg, recognize the anti-analysis code in the DLL and patch the instructions to bypass the protections and analyze it anyway.


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;This course was only 3 months long but it gave me an edge in the experience I'll need to land a Malware Analysis role later on in the future. After completing the course, I feel taking the volunteer role was the right choice to make because I now have new connections within Binary Defense. Around April - May I continue my approach of reaching out to recruiters expressing my interest in roles at their company. While reaching out to companies I came across the company &lt;em&gt;"Huntress"&lt;/em&gt; and one of their roles piqued my interest, so I decided to reach out to the CEO and said:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

Hello Kyle,
My name is Jonathan, I'm a malware analyst and I was interested in learning more about your company. I was wondering does Huntress host any paid intern/apprenticeships. It seems like a great company to work at with lots of growth potential. I look forward to chatting with you!

Thank you


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;After doing so, Kyle reached out and wanted to schedule an interview for us to have a chat with him and his team. I was given a chance to chat with Kyle, John Hammond along with other members of the team and gain valuable connections. Unfortunately the role I experienced interest in at the company I did not have enough experience. Although disheartened, this did not discourage me, I continued my search and studies, not much time passed until I received an interview invitation that would be the interview that would make my 6-year-long struggle worth it. &lt;/p&gt;




&lt;h2&gt;
  
  
  The Internship
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FMyulCNv.png" width="800" height="364"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In May, I received an invitation for an interview for Threat Analysis Intern role I applied for months prior for the company &lt;em&gt;"IronNet Cybersecurity"&lt;/em&gt;. I was more than confident I'd be able to land the job, and I did! Here is the job description as it was listed:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

Our mission is simple:

Deliver the power of collective cybersecurity to defend companies, sectors, and nations. For decades, companies have been defending against cyberattacks on their own while adversaries have been organizing themselves into sophisticated hacker networks, until now with IronNet Collective Defense.

Bringing together some of the best minds in cybersecurity and an unmatched team of experts from industry, government, and academia, IronNet was born to more effectively defend enterprises, sectors, and nations against highly organized cyber adversaries and increasingly sophisticated attacks.

- Research and create lead generation queries for C2 frameworks
- Analyze C2 servers
- Create queries
- Analyze analytic results for additional use cases
- Develop hunt queries for open search
- Create common queries that look for malicious use


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Once I was offered the role my start date was June 1st, and throughout the internship, the amount of anxiety and imposter syndrome I experienced was through the roof. I've had many sleepless nights just trying to get work done and lots of meetings with my mentors to get help with troubleshooting errors that I had and didn't know how to fix. Even though this internship was challenging I still learned a lot of valuable skills and information which I will be able to use later on in my career. I was allowed to work with AWS OpenSearch, ElasticSearch, work in the security teams development environment, and more! The projects I was assigned were to convert Scala hunt queries into OpenSearch queries and dashboards for the security teams to use later in the future. My second project was to create a wrapper for Open and ElasticSearch so that the security teams would be able to query the Open and ElasticSearch database from their CLI. &lt;/p&gt;

&lt;p&gt;I am extremely grateful for this experience although it was only a short 2 months. Not only did I get to work on some great projects, but I also got to meet some great people during the internship, make lots of new connections and do some fun activities with the other interns. One of the activities was a book club where we were tasked with reading two books &lt;em&gt;"Leaders Eat Last"&lt;/em&gt; and &lt;em&gt;"The Happiness Equation"&lt;/em&gt; These two books taught me life skills that I would remember fondly throughout the rest of my journey (I don't want to spoil the books 😉). During the 2 months of the internship, I kept applying to other roles and was still getting interviews for other full-time times during this time from companies such as &lt;em&gt;"Offensive Security", "Cisco", and "Macquarie"&lt;/em&gt; and more. There was one company that changed everything for me and was able to help me land the career of my dreams making $190K/yr.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Finish Line
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FPLswUfA.png" width="800" height="110"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With the internship coming to a close in less than 2 weeks, a recruiter from Apex Systems reaches out to me looking to fill a Malware Analyst role at Bank of America. I happily agreed to proceed with the interview, although I've been in countless interviews, interviewing never got any easier despite how confident I was. Fast forward to the day of the interview and everything went flawlessly, out of all the interviews I've been in the past 4 years this was the BEST interview I've been in. &lt;/p&gt;

&lt;p&gt;Not only did I feel really good about my answers during the technical interview but I also had a chance to bond with the team as well during a few personable questions. Typical after all my other interviews I usually leave the call with a sense of anxiety and discouragement as I know the interview didn't go well. After 6 years of applying for jobs and interviewing I can proudly say that I've never felt such ecstasy after an interview, and with that said I was offered the role a few days later! It's been a long journey and extremely stressful journey getting to where I am today, In the end, it was all worth it.&lt;/p&gt;

&lt;h1&gt;
  
  
  Connect With Me!
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>security</category>
      <category>programming</category>
    </item>
    <item>
      <title>IAANSEC | WannaCry Analysis Report</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Sun, 10 Apr 2022 05:53:43 +0000</pubDate>
      <link>https://dev.to/l0wk3y/wannacry-analysis-report-g7c</link>
      <guid>https://dev.to/l0wk3y/wannacry-analysis-report-g7c</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7iva5zymxusmn2np296i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7iva5zymxusmn2np296i.png" width="800" height="386"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  WannaCry Ransomware Report
&lt;/h1&gt;

&lt;h4&gt;
  
  
  Apr 09, 2022 | L0WK3Y
&lt;/h4&gt;



&lt;h2&gt;
  
  
  Table of Contents
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Executive Report&lt;/li&gt;
&lt;li&gt;High-Level Technical Summary&lt;/li&gt;
&lt;li&gt;Malware Composition&lt;/li&gt;
&lt;li&gt;Static Analysis&lt;/li&gt;
&lt;li&gt;Dynamic Analysis&lt;/li&gt;
&lt;li&gt;Indicators of Compromise&lt;/li&gt;
&lt;li&gt;Yara Rules&lt;/li&gt;
&lt;/ol&gt;






&lt;h2&gt;
  
  
  Executive Summary
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;sha256: 24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Wannacry is a ransomware that utilized the &lt;a href="https://blog.malwarebytes.com/glossary/eternalblue/" rel="noopener noreferrer"&gt;EternalBlue&lt;/a&gt; exploit to propagate through the targets network and attacked outdated Windows computers globally in May of 2017. WannaCry was a multistage attack starting with a dropper which unpacked a payload onto the targets system under the right conditions. Once the files were encrypted, the threat actors demanded a ransom of $300 worth of Bitcoin. If the ransom is not paid in a specified amount of time, the ransom is increased to $600. This attack infected around 230,000 computers across 150 countries. Marcus Hutchins later discovered a kill switch that stalled the spread of the attack. Click &lt;a href="https://app.any.run/tasks/04098f9a-244d-453f-8d75-891e5631a135/" rel="noopener noreferrer"&gt;here&lt;/a&gt; to view the full analysis report.&lt;/p&gt;



&lt;h2&gt;
  
  
  High-Level Technical Summary
&lt;/h2&gt;

&lt;p&gt;WannaCry consist of 2 stages: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;The first stage being a dropper that tries to make contact with a suspicious URL that can be found in the strings &lt;code&gt;hxxp[://]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com&lt;/code&gt; if a connection is established the program exits, if a connection is not established the program proceeds with the rest of the execution. Once the program proceeds with execution a service is created by the program &lt;code&gt;mssecsvc2.0&lt;/code&gt; and has the display name &lt;code&gt;Microsoft Security Center (2.0) Service&lt;/code&gt;. The service also contains a path to the executable &lt;code&gt;&amp;lt;PATH_TO_WANNACRY&amp;gt;\wannacry.exe -m security&lt;/code&gt;. During this stage the program will attempt to propagate by reaching out to a large range of IPv4 addresses.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Stage two the payload is unpacked from the dropper and proceeds to create persistence mechanisms such as creating a folder in the &lt;code&gt;C:\ProgramData\&amp;lt;GENERATED_STRING&amp;gt;\&lt;/code&gt; directory and creating a file named &lt;code&gt;tasksche.exe&lt;/code&gt; in the &lt;code&gt;C:\Windows\&lt;/code&gt; path and copying itself to the newly created directory. Once the file has been copied to the directory, a service is created and is named after the same generated string as the newly created folder and contains a path leading to the payload &lt;code&gt;C:\ProgramData\&amp;lt;GENERATED_STRING&amp;gt;\tasksche.exe&lt;/code&gt;. After the service is created and the payload is executed the encryption process starts which changes the background image, drops instructions on how to decrypt the files and more in the generated directory. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fclk58u6av6ghakl9wicp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fclk58u6av6ghakl9wicp.png" width="800" height="699"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.0 &lt;a href="https://bit.ly/3xkU3F9" rel="noopener noreferrer"&gt;Execution flow graph&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;



&lt;h2&gt;
  
  
  Malware Composition
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Item&lt;/th&gt;
&lt;th&gt;SHA-256 Hash&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Ransomware.wannacry.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;tasksche.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;@WanaDecryptor@[.]exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;taskdl.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;taskhsvc.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;taskse.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Item&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Ransomware.wannacry.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Initial file detonated&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;tasksche.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;The payload unpacked from the dropper&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;@WanaDecryptor@[.]exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;The GUI application that is executed by tasksche after all files have been encrypted and handles ransom payment&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;taskdl.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;SQL Client Configuration Utility EXE&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;taskhsvc.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Handles communication to TOR URL and other TOR activites&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;taskse.exe&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Waitfor - Wait/send a signal over a network&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;






&lt;h2&gt;
  
  
  Static Analysis
&lt;/h2&gt;



&lt;h4&gt;
  
  
  The original file name can be found in the "Version" tab of PE Studio
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffssstqwbpnquc4rvbneb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffssstqwbpnquc4rvbneb.png" width="422" height="135"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.1 Original filename of dropper.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Compiler time stamp reports Nov. 20, 2010 in PE Studio.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmliul54i4nix7s7p3gds.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmliul54i4nix7s7p3gds.png" width="550" height="18"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.2 Image showing was date dropper was compiled.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Executable can be found in the .rsrc section of the dropper executable.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fajizoqc6073v9twvom8r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fajizoqc6073v9twvom8r.png" width="800" height="312"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.3 Image of executable in the .rsrc header of the dropper.&lt;/em&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdfjwbr805x8r9fkuibuf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdfjwbr805x8r9fkuibuf.png" width="743" height="730"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.4 Payload found in the 00407ce0 function&lt;/em&gt;&lt;br&gt;
&lt;br&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Found a URL that the dropper tries to communicate with at the start of it's execution.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwl6yknmi76sdasxz72za.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwl6yknmi76sdasxz72za.png" width="458" height="43"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsilvfgt0bmf1ogfhrld6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsilvfgt0bmf1ogfhrld6.png" width="647" height="1031"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.5 Reference to DNS query URL string.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  A few imports of interest:
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0qar404v6eh2zdjsyxvb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0qar404v6eh2zdjsyxvb.png" width="452" height="576"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.6 Imports of interest in the dropper.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Addresses to the bitcoin wallets can be found in the function starting at address 0x00401E9E within the &lt;code&gt;tasksche.exe&lt;/code&gt; executable. BTC addresses are randomly selected.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzab3wqz9pz4rywbv5lpq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzab3wqz9pz4rywbv5lpq.png" width="587" height="35"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.7 Bitcoin addresses found in the payload&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;br&gt;
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Dynamic Analysis
&lt;/h2&gt;



&lt;h4&gt;
  
  
  Dropper tries to reach out to the suspicious URL.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4s0jq9slotgd1lncolrm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4s0jq9slotgd1lncolrm.png" width="800" height="45"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1gja1q7t6oogixln2dqo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1gja1q7t6oogixln2dqo.png" width="800" height="320"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.8 Dropper making DNS query to suspicious URL.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  If the connection to the URL fails, the program proceeds and pushes two arguments to the stack &lt;code&gt;&amp;lt;PATH_TO_WANNACRY&amp;gt;&lt;/code&gt; and &lt;code&gt;-m security&lt;/code&gt; which are then passed as parameters to the &lt;code&gt;CreateServiceA&lt;/code&gt; function. The strings &lt;code&gt;mssecsvc2.0&lt;/code&gt; and &lt;code&gt;Microsoft Security Center (2.0) Service&lt;/code&gt; are also pushed to the stack in preparation for the creation of the service. The program proceeds to create a service named &lt;code&gt;mssecsvc2.0&lt;/code&gt; with the display name of &lt;code&gt;Microsoft Security Center (2.0) Service&lt;/code&gt;. Below are images of the service being prepared and the service after creation.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbtwxdf7p13oj0mod6vxp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbtwxdf7p13oj0mod6vxp.png" width="800" height="331"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxe909k9y0j9mahj9y1b3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxe909k9y0j9mahj9y1b3.png" width="406" height="466"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.9 Dropper creates service as a persistence mechanism&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  After the creation of the service the payload attempts to connect to a range of IPv4.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0232ejtkvgqb3a4trt60.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0232ejtkvgqb3a4trt60.png" width="800" height="151"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.10 Service attempts to reach out to a range of IPv4.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  A reference to the payload can be seen being pushed to the stack along with another string of interest can be found stepping through the dropper in x32dbg.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F61uxqqc41bgrfngntyb9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F61uxqqc41bgrfngntyb9.png" width="747" height="137"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.11 Reference to packed payload.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  The payload is later unpacked on to the system in the &lt;code&gt;C:\Windows&lt;/code&gt; directory and is executed.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnuwhk9sdfzvc50vz7ehn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnuwhk9sdfzvc50vz7ehn.png" width="770" height="68"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4mtutpa3eu019ie3xki9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4mtutpa3eu019ie3xki9.png" width="658" height="23"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fankr0gupechnjyrx5p5h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fankr0gupechnjyrx5p5h.png" width="363" height="525"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.12 Payload is unpacked by dropper.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  The payload generates a string based on the host name of the system and creates a folder named after the generated string in the &lt;code&gt;C:\ProgramData&lt;/code&gt; directory. After the creation of the directory a copy of the payload is moved to the directory.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsw09hdut6clnw83e8fks.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsw09hdut6clnw83e8fks.png" width="747" height="145"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9121rv60bryjxqnjzp86.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9121rv60bryjxqnjzp86.png" width="266" height="78"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.13 Payload generates random string based on the system name, creates a folder in the &lt;code&gt;C:\ProgramData&lt;/code&gt; directory with the generated name and copies the payload to the generated directory.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Along with the creation of the new directory a service is also created with the same generated name as the directory which uses cmd to execute tasksche as a persistence mechanism.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1dh9tbjgcfw9r39ufaco.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1dh9tbjgcfw9r39ufaco.png" width="404" height="466"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.14 Service is created with the same name as the generated string.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  A registry named &lt;code&gt;WanaCrypt0r&lt;/code&gt; and registry key named &lt;code&gt;wd&lt;/code&gt; are created with the key value set to the newly created directory in &lt;code&gt;C:\ProgramData\&amp;lt;RANDOMLY_GENERATED_STRING&amp;gt;&lt;/code&gt;.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcs5n9nikdfm3cx9ka20p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcs5n9nikdfm3cx9ka20p.png" width="474" height="81"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdowbfa6w9vpdba5kcbot.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdowbfa6w9vpdba5kcbot.png" width="662" height="88"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.15 Registry key created by payload service.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  After the payload has executed the &lt;code&gt;@WanaDecryptor@.exe&lt;/code&gt; executable is dropped along with various other files in the same directory as the payload's execution and creates a shortcut to the executable on the Desktop.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff4pqb30anxt3kn6u7b1n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff4pqb30anxt3kn6u7b1n.png" width="602" height="367"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.16 Files dropped from payload after encryption process has begun.&lt;/em&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Lastly, the system background is changed and a GUI of the &lt;code&gt;@WanaDecryptor@.exe&lt;/code&gt; is displayed.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ryhpkeoyg1o2jkqtzde.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ryhpkeoyg1o2jkqtzde.png" width="800" height="355"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsb0xfd6r5b8gb23379rq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsb0xfd6r5b8gb23379rq.png" width="800" height="603"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Fig.17 Background changed and GUI application displayed&lt;/em&gt;&lt;/p&gt;






&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Network Indicators
&lt;/h3&gt;



&lt;h4&gt;
  
  
  Dropper observed making DNS Query to suspicious domain.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1gja1q7t6oogixln2dqo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1gja1q7t6oogixln2dqo.png" width="800" height="320"&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Payload attempts establish contact with a range of IPv4 addresses.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0232ejtkvgqb3a4trt60.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0232ejtkvgqb3a4trt60.png" width="800" height="151"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Host Based Indicators
&lt;/h3&gt;



&lt;h4&gt;
  
  
  Payload is unpacked on to system in &lt;code&gt;C:\Windows&lt;/code&gt;.
&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;(Note) During the debugging process, there was a mention of a file in the directory &lt;code&gt;C:\Windows&lt;/code&gt; named &lt;code&gt;qeriuwjhrf&lt;/code&gt; but the file was never created.&lt;/em&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fankr0gupechnjyrx5p5h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fankr0gupechnjyrx5p5h.png" width="363" height="525"&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Creation of services.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxe909k9y0j9mahj9y1b3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxe909k9y0j9mahj9y1b3.png" width="406" height="466"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1dh9tbjgcfw9r39ufaco.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1dh9tbjgcfw9r39ufaco.png" width="404" height="466"&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Creation of registry key.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcs5n9nikdfm3cx9ka20p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcs5n9nikdfm3cx9ka20p.png" width="474" height="81"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdowbfa6w9vpdba5kcbot.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdowbfa6w9vpdba5kcbot.png" width="662" height="88"&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h4&gt;
  
  
  Creation of files following the execution of the payload in the same directory as the execution. Along with files ending in the &lt;code&gt;.WNCRY&lt;/code&gt; extension.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff4pqb30anxt3kn6u7b1n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff4pqb30anxt3kn6u7b1n.png" width="602" height="367"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Background change and appearance of GUI application.
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ryhpkeoyg1o2jkqtzde.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ryhpkeoyg1o2jkqtzde.png" width="800" height="355"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsb0xfd6r5b8gb23379rq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsb0xfd6r5b8gb23379rq.png" width="800" height="603"&gt;&lt;/a&gt;&lt;/p&gt;






&lt;h2&gt;
  
  
  Yara Rules
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
 yara
rule wannacry_ruleset {
    meta:
    last_updated = "04-09-2022"
    author = "IAANSEC"
    description = "Yara rule to detect wannacry ransomware."
    hash256 = "24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c"

    strings:
        $MZ_byte = "MZ"
        $querydomain_killswitch = "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea" ascii
        $weird_windows_dir_str = "qeriuwjhrf" ascii
        $reg_name = "WanaCrypt0r" ascii
        $service = "Microsoft Security Center (2.0) Service" ascii
        $payload = "tasksche" ascii
        $exe1 = "taskdl" ascii
        $exe2 = "taskse" ascii
        $import = "Crypt" ascii
        $str = "WNcry@2017" ascii
        $decrypt_exe = "@WanaDecryptor@.exe" ascii
        $wnry = "wnry" ascii
        $decrypt = "decrypt" ascii
        $bitcoin = "bitcoin" ascii
        $btc_wallet1 = "115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn" fullword ascii
        $btc_wallet2 = "13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94" fullword ascii
        $btc_wallet3 = "12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw" fullword ascii

    condition:
        $MZ_byte at 0 and
        5 of them     
}


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;




&lt;h1&gt;
  
  
  Connect With Me 🙂
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>malwareanalysis</category>
      <category>security</category>
      <category>reverseengineering</category>
      <category>report</category>
    </item>
    <item>
      <title>TryHackMe - Searchlight - IMINT (Writeup)</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Mon, 28 Mar 2022 08:05:00 +0000</pubDate>
      <link>https://dev.to/l0wk3y/tryhackme-searchlight-imint-write-up-2ee8</link>
      <guid>https://dev.to/l0wk3y/tryhackme-searchlight-imint-write-up-2ee8</guid>
      <description>&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FjmKHOYC.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Welcome to the Searchlight IMINT room!
&lt;/h2&gt;

&lt;p&gt;In this room we will be exploring the discipline of IMINT/GEOINT, which is short for Image intelligence and geospatial intelligence. This room is suited for those of you who are just beginning your OSINT journey or those brand new to the field of IMINT/GEOINT.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This room will introduce you to several topics within IMINT, among them:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Getting into the right mindset and how to be analytical.&lt;/li&gt;
&lt;li&gt;Visually extracting key data points from an image or video.&lt;/li&gt;
&lt;li&gt;Applying different tools to assist you in geolocation and answering context questions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When you have completed this room you should be comfortable applying tools and methodologies to geolocate and answer context questions based on visual intelligence alone. This room will prepare you for harder CTF challenges in this category as well as real-world geolocation work. &lt;/p&gt;

&lt;p&gt;Any thoughts, feedback or issues can be forwarded to me directly on the THM or Searchlight Discord. You'll find me there as zewen.&lt;/p&gt;

&lt;p&gt;The flag format is: &lt;code&gt;sl{flag}&lt;/code&gt; - this means that every answer needs to be submitted within the brackets, &lt;code&gt;sl{your answer}&lt;/code&gt;. No capitalization is needed. &lt;/p&gt;

&lt;p&gt;If you are stuck or you want someone to discuss these challenges with, head on over to the OSINT Curious &lt;a href="https://discord.gg/gX4KeWT" rel="noopener noreferrer"&gt;Discord server&lt;/a&gt;. You can also find me on &lt;a href="https://twitter.com/Zewensec" rel="noopener noreferrer"&gt;Twitter&lt;/a&gt; if you have any questions!&lt;/p&gt;




&lt;h2&gt;
  
  
  Questions
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Task 2: "Your first challenge!"
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F0fyTA20.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F0fyTA20.jpg" alt="image alt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q1: What is the name of the street where this image was taken?
&lt;/h3&gt;

&lt;p&gt;With this being an introductory question, the answer is pretty straightforward. The street name is on the sign &lt;strong&gt;Carnaby Street&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Task 3: "Just Google It!"
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FFXMcv4E.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FFXMcv4E.jpg" alt="image alt"&gt;&lt;/a&gt;&lt;br&gt;
For starters I won't be using reverse image search, because where's the fun in that. Instead I will explain the thought process I had while analyzing the image. With that said, the first thing I noticed was the European architecture of the buildings in the background. Next, I noticed the &lt;em&gt;Circus St...&lt;/em&gt; on the sign above the stairway. After doing a Google search with the information gathered &lt;em&gt;Public Subway Underground Circus Station&lt;/em&gt;, I was able to obtain the information needed to answer the questions.&lt;/p&gt;

&lt;h3&gt;
  
  
  Q1: Which city is the tube station located in?
&lt;/h3&gt;

&lt;p&gt;The station is located in &lt;strong&gt;London&lt;/strong&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Q2: Which tube station do these stairs lead to?
&lt;/h3&gt;

&lt;p&gt;The first result shown after the Google search was a Wiki page for &lt;strong&gt;Piccadilly Circus&lt;/strong&gt;, which lines up with the circus portion of the sign. &lt;/p&gt;

&lt;h3&gt;
  
  
  Q3: Which year did this station open?
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"Piccadilly Circus tube station was opened on 10 March **1906&lt;/em&gt;&lt;em&gt;, on the Bakerloo line, and on the Piccadilly line in December of that year."&lt;/em&gt; - &lt;a href="https://en.wikipedia.org/wiki/Piccadilly_Circus" rel="noopener noreferrer"&gt;Wikipedia&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q4: How many platforms are there in this station?
&lt;/h3&gt;

&lt;p&gt;Googling &lt;em&gt;"How many platforms are there in Piccadilly Circus?"&lt;/em&gt; returns &lt;strong&gt;4&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Task 4: "Keep at it!"
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FpM6NyT1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FpM6NyT1.png" alt="image alt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Right off the bat I see a banner which says &lt;em&gt;"YVR Connects"&lt;/em&gt; and &lt;em&gt;"YVR.&lt;/em&gt;&lt;em&gt;CA&lt;/em&gt;&lt;em&gt;"&lt;/em&gt; which leads me to think this building is located in Canada. This is enough intel for me to start doing some research.&lt;/p&gt;

&lt;h3&gt;
  
  
  Q1: Which building is this photo taken in?
&lt;/h3&gt;

&lt;p&gt;After searching &lt;em&gt;"YVR Connects"&lt;/em&gt; on Google, the first result I was presented with was the &lt;a href="https://en.wikipedia.org/wiki/Vancouver_International_Airport" rel="noopener noreferrer"&gt;&lt;strong&gt;Vancouver International Airport&lt;/strong&gt;&lt;/a&gt; Wikipedia page.&lt;/p&gt;

&lt;h3&gt;
  
  
  Q2: Which country is this building located in?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Canada&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q3: Which city is this building located in?
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;"Vancouver International Airport (IATA: YVR, ICAO: CYVR) is a Transport Canada designated international airport[5] located on Sea Island in **Richmond&lt;/em&gt;&lt;em&gt;, British Columbia."&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Task 5: "Coffee and a light lunch"
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2Fieseamd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2Fieseamd.png" alt="image alt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This task requires you to do a bit more searching than the others. After searching the name of the store across the street, &lt;em&gt;"The Edinburgh Wollen Mill"&lt;/em&gt; You are presented with numerous results. My approach to near down the choices was by adding "Coffee shops near..." at the start of the initial Edinburgh search. After doing so, a couple coffee shops popped up in the results, but I narrowed my choices down to two coffee shops &lt;strong&gt;"The Wee Coffee Shop"&lt;/strong&gt; and &lt;em&gt;"Courtyard Coffee Shop"&lt;/em&gt;. I made my final decision by doing a Google Street View for both coffee shop and The Wee Coffee Shop was the right coffee shop. With that I was able to gather the intel needed to answer the questions.&lt;/p&gt;

&lt;h3&gt;
  
  
  Q1: Which city is this coffee shop located in?
&lt;/h3&gt;

&lt;p&gt;1 Allan St, &lt;strong&gt;Blairgowrie&lt;/strong&gt; PH10 6AB, United Kingdom&lt;/p&gt;

&lt;h3&gt;
  
  
  Q2: Which street is this coffee shop located in?
&lt;/h3&gt;

&lt;p&gt;1 &lt;strong&gt;Allan St&lt;/strong&gt;, Blairgowrie PH10 6AB, United Kingdom&lt;/p&gt;

&lt;h3&gt;
  
  
  Q3: What is their phone number?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;+447878839128&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q4: What is their email address?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="mailto:theweecoffeeshop@aol.com"&gt;theweecoffeeshop@aol.com&lt;/a&gt;&lt;/strong&gt; (Can be found on their Facebook page which is linked on their businesses Google maps panel.)&lt;/p&gt;

&lt;h3&gt;
  
  
  Q5: What is the surname of the owners?
&lt;/h3&gt;

&lt;p&gt;Debbie and David &lt;strong&gt;Cochrane&lt;/strong&gt; (Can be found by searching &lt;em&gt;"The Wee Coffee Shop Owners"&lt;/em&gt;)&lt;/p&gt;

&lt;h2&gt;
  
  
  Task 6: "Reverse your thinking"
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FND3iOOg.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FND3iOOg.jpg" alt="image alt"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This task will require you to do a reverse image search since there is no text that stands out in the image. The quickest way to do an reverse image search is by dragging and dropping the image into the Google search bar. After doing so you will be presented &lt;strong&gt;"Katz's Delicatessen"&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q1: Which restaurant was this picture taken at?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Katz's Deli&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q2: What is the name of the Bon Appétit editor that worked 24 hours at this restaurant?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Andrew Knowlton&lt;/strong&gt; (Can be found by searching &lt;em&gt;"Katz's Deli Bon Appétit Editor"&lt;/em&gt;)&lt;/p&gt;

&lt;h2&gt;
  
  
  Task 7: "Locate this sculpture"
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F0LLAPO0.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F0LLAPO0.jpg" alt="image alt"&gt;&lt;/a&gt;&lt;br&gt;
For this task I started off with another reverse image search on Google. After doing so the first link to pop up was &lt;em&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.visitoslo.com%2Fen%2Farticles%2Foutdoor-sculptures-in-oslo%2F" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.visitoslo.com%2Fen%2Farticles%2Foutdoor-sculptures-in-oslo%2F" alt="Visit Oslo"&gt;&lt;/a&gt;&lt;/em&gt;. In the description of the URL before clicking it, there is a mention of &lt;strong&gt;"Rudolph the Chrome Nosed Reindeer"&lt;/strong&gt;. Once on the site scroll down until you are presented with a map. Once the map is displayed click on the marker that is beneath &lt;em&gt;TJUVHOLMEN&lt;/em&gt;. After clicking on the correct marker, a side panel will be displayed with name of the sculpture and the name of photographer.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FdUS0Uh2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FdUS0Uh2.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q1: What is the name of this statue?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Rudolph the Chrome Nosed Reindeer&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q2: Who took this image?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Kjersti Stensrud&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Task 8: "...and justice for all"
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FLK0OmEK.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FLK0OmEK.png"&gt;&lt;/a&gt;&lt;br&gt;
Once I opened the image, the first thing that stood out to me was &lt;em&gt;The Verge&lt;/em&gt; watermark in the bottom right corner. I made sure to keep the watermark in mind once proceeding to the reverse image search. After doing a RIS I realized that I can't always rely on JUST Google RIS, it gave me results differing from Bing's RIS. On Google the RIS returned the name &lt;em&gt;"Blind Justice Man"&lt;/em&gt;, Bing returned &lt;strong&gt;"Lady Justice"&lt;/strong&gt;. After a bit of scrolling through the related images on Bing my trail went cold. My thought process was to see if I could find any images of the statue from a wider angle to see if I could possibly find the building name. So I decided to transition over to Yandex and do a RIS there, I had better luck there because I found this as a related image &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdiff.wikimedia.org%2Fwp-content%2Fuploads%2F2016%2F04%2Falbert_v_bryan_federal_district_courthouse_-_alexandria_va_-_0018_-_2012-03-10.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdiff.wikimedia.org%2Fwp-content%2Fuploads%2F2016%2F04%2Falbert_v_bryan_federal_district_courthouse_-_alexandria_va_-_0018_-_2012-03-10.jpg"&gt;&lt;/a&gt; &lt;br&gt;
On Yandex you can search by image fragment, doing this you can crop just the text in the image and search for related images based on that fragment. After searching by fragment, I found this related image. &lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fstatic.politico.com%2Fdims4%2Fdefault%2F8c15ed8%2F2147483647%2Fresize%2F1160x%253E%2Fquality%2F90%2F%3Furl%3Dhttps%253A%252F%252Fstatic.politico.com%252Faa%252Fc9%252F7e4f93804e29b8499de680406967%252F190924-alexandria-courthouse-gty-773.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fstatic.politico.com%2Fdims4%2Fdefault%2F8c15ed8%2F2147483647%2Fresize%2F1160x%253E%2Fquality%2F90%2F%3Furl%3Dhttps%253A%252F%252Fstatic.politico.com%252Faa%252Fc9%252F7e4f93804e29b8499de680406967%252F190924-alexandria-courthouse-gty-773.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can now see the text &lt;em&gt;"T V. Bryan United States Court"&lt;/em&gt;. I then search, &lt;em&gt;"V. Bryan United States Court"&lt;/em&gt; on Yandex since I'm already on the site, and was then presented with the full name of the courthouse and it's location. With that, I gathered enough information to answer the last question.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FbZbzorB.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FbZbzorB.png"&gt;&lt;/a&gt; &lt;br&gt;
Now that I had the name of the court I went to Google Maps Street View and got the name of the building opposite of the courthouse.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F0YXQVW2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F0YXQVW2.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q1: What is the name of the character that the statue depicts?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Lady Justice&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q2: Where is this statue located?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Alexandria, Virginia&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q3: What is the name of the building opposite from this statue?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;The Westin Alexandria Old Town&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Task 9: "The view from my hotel room"
&lt;/h2&gt;

&lt;p&gt;For this task, we are presented with a &lt;a href="https://www.youtube.com/embed/Yjj7MNj08ic" rel="noopener noreferrer"&gt;video&lt;/a&gt; to analyze. A couple seconds into the video we can see a building with the sign &lt;em&gt;"Riverside Point"&lt;/em&gt;. We can pause the video at this frame, screenshot it and do a RIS on this frame.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FU4DBQfi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FU4DBQfi.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;On Yandex I was presented with this related image, on the bottom left we can see the location of the building.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Faltermama.ru%2Fwp-content%2Fuploads%2F2015%2F12%2FIMG_0411.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Faltermama.ru%2Fwp-content%2Fuploads%2F2015%2F12%2FIMG_0411.jpg"&gt;&lt;/a&gt;&lt;br&gt;
Now that I know the location of the building, I do a search on Google Maps for &lt;em&gt;"Riverside Point Singapore"&lt;/em&gt;. Once I've navigated to the location, I head back over to the video to have a look at the angle the Riverside Point building was recorded from. I've marked the location I believe the video was recorded from on the map. &lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F9Fi7eH6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F9Fi7eH6.png"&gt;&lt;/a&gt;&lt;br&gt;
I then confirmed my suspicions by heading into street view to have a look at the building. Google Street View's last update of this building shows it was under construction as of February 2021.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FbYuCEGu.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FbYuCEGu.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Although, after searching around the building in Street View, if you click on this entrance to the construction site&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FDUfe8BE.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FDUfe8BE.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It actually reveals an older 3D street view from 2018 before the construction. Once I came across the older street view model, I then noticed the name &lt;em&gt;"Tanyoto"&lt;/em&gt;. I then searched "Tanyoto Singapore Hotel", and was given the result &lt;a href="https://unilocal.net/singapore/singapore/novotel-clarke-quay" rel="noopener noreferrer"&gt;&lt;strong&gt;Novotel Clarke Quay&lt;/strong&gt; - Singapore, 177a Riv Vly Rd&lt;/a&gt;. My guess is Tanyoto is the older name of the hotel before it's reconstruction.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2Fe01oYIb.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2Fe01oYIb.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Q1: What is the name of the hotel that my friend is staying in?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Novotel Singapore Clarke Quay&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Connect With Me 🙂
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tryhackme</category>
      <category>writeup</category>
      <category>cybersecurity</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>IAANSEC - BrickRoll (Official Write Up)</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Sat, 05 Feb 2022 22:44:40 +0000</pubDate>
      <link>https://dev.to/l0wk3y/thm-brickroll-official-write-up-378d</link>
      <guid>https://dev.to/l0wk3y/thm-brickroll-official-write-up-378d</guid>
      <description>&lt;h1&gt;
  
  
  Witness the Rick Astley Experience NOW!
&lt;/h1&gt;

&lt;p&gt;&lt;em&gt;Developed by L0WK3Y&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Intro
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;"Odd, I clicked on the Rick Astley Simulator icon but it didn't.... Wait...OH MY GOD MY EARS!!!"&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this IAANSEC CTF you will be tasked with analyzing the Rick Astley Experience binary. This room will test your cryptography, stenography and malware analysis skills. Have fun and good luck!&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(Quick note, majority of flags are Rick Roll lyrics and are separated with an underscore "_". Lastly I HIGHLY recommend using Procmon to solve this CTF)&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Questions
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Task 1: The Rick Astley Experience
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Where is that God awful music coming from?
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwsno8tk8gwznyj3ihuzj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwsno8tk8gwznyj3ihuzj.png" alt="img" width="453" height="94"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What happened to my wallpaper?
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl28kyasz5f7lm6gxltds.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl28kyasz5f7lm6gxltds.png" alt="img" width="370" height="182"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What is the name of the program causing havoc?
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8nsn606g3vqnf0s0dyrd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8nsn606g3vqnf0s0dyrd.png" alt="img" width="665" height="591"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What file is created when the executable is ran without internet access?
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6kj5o5j927jyy2efcusu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6kj5o5j927jyy2efcusu.png" alt="img" width="379" height="96"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What is the key to decode the sus.txt flag?
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;(It was in the directory of the first flag)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwsno8tk8gwznyj3ihuzj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwsno8tk8gwznyj3ihuzj.png" alt="img" width="453" height="94"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What is the sus.txt flag?
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;(I recommend using &lt;a href="https://www.dcode.fr/rot-cipher" rel="noopener noreferrer"&gt;https://www.dcode.fr/rot-cipher&lt;/a&gt; to solve this flag, don't forget the underscores!)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fry97g2hcss0keffwzu9e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fry97g2hcss0keffwzu9e.png" alt="img" width="765" height="139"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  I hate getting into arguments...
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;(Decode the base64 for the flag)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fivqzsj3alps1agkf2tc8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fivqzsj3alps1agkf2tc8.png" alt="img" width="451" height="62"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ctf</category>
      <category>tryhackme</category>
      <category>thm</category>
    </item>
    <item>
      <title>TryHackMe - REloaded Writeup</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Thu, 09 Dec 2021 02:49:17 +0000</pubDate>
      <link>https://dev.to/l0wk3y/tryhackme-reloaded-writeup-4n1o</link>
      <guid>https://dev.to/l0wk3y/tryhackme-reloaded-writeup-4n1o</guid>
      <description>&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2F7XRakgP.jpg" width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Intro
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;"This room is dedicated for the RE challenges, each challenge has unique concepts divided in each binaries. As if now only phase 1 is added will decide about phase 2 on response. Developed by WhiteHeart and tested by IslaMukheef"&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this TryHackMe room you will be tasked with cracking various executables and in each level the challenges gradually increase in difficulty. This will definitely test your skills as a reverse engineer. &lt;/p&gt;

&lt;h2&gt;
  
  
  Tools Used
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;-Windows, Linux&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;-Ghidra&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;&lt;em&gt;-x64dbg&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Questions
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Task 1: This challenge is the most basic of RE.  It will teach about how to enumerate files and get juicy details.
&lt;/h3&gt;

&lt;p&gt;Like every reverse engineering CTF, I started things off by pulling strings from the executable to see what catches my eye. After searching for strings in Ghidra I found 1 string that looks like a flag that was referenced in the function &lt;strong&gt;&lt;em&gt;FUN_00401410&lt;/em&gt;&lt;/strong&gt; and address &lt;strong&gt;&lt;em&gt;0040142b&lt;/em&gt;&lt;/strong&gt; and 2 that look like an output string after a comparison is made between the correct string and the users input, 1 more string that tells the user to enter the flag. &lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fchslbbpcpve4guzstq5c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fchslbbpcpve4guzstq5c.png" alt="img" width="543" height="80"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After navigating to the address where the "Enter The Flag" string is referenced I am now presented with what you see blow in the decompiler. After analyzing the information I was able to deduce that &lt;code&gt;char local_40 [20];&lt;/code&gt; must be the variable that holds the users input since it is only allowed 20 bytes and the flag itself is 18 bytes. There were also a few empty functions, but looking towards the bottom we can see the same function where the flag string was referenced. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fohiwi95ervkxcztr5uqv.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fohiwi95ervkxcztr5uqv.jpg" alt="img" width="369" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After heading to that function I was presented with this in the decompiler. It's safe to assume that this must be the flag check function. On line 9 and 11, it looks like the author of this program created callback functions that act similarly to how the strcpy and strcmp functions work. &lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd2hgznsaph9bjw4wisc4.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd2hgznsaph9bjw4wisc4.jpg" alt="img" width="398" height="444"&gt;&lt;/a&gt;&lt;br&gt;
I went ahead and renamed the functions accordingly as you can see below. On line 9 the flag string is copied into the variable &lt;em&gt;local_28&lt;/em&gt;. On line 11 the strcmp_callback function is used to compare &lt;em&gt;param_1&lt;/em&gt; (the users input) to &lt;em&gt;local_28&lt;/em&gt; (the flag variable). If at any point the users input gets null terminated in the comparison process the string &lt;em&gt;"Don't Worry its a start ;)"&lt;/em&gt; is printed to the terminal, if the users' input and flag variable match, the string &lt;em&gt;"That was easy...Bruh!!!"&lt;/em&gt; is printed to the terminal.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkww9jnl644b9jvdofijq.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkww9jnl644b9jvdofijq.jpg" alt="img" width="414" height="441"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Task 2: Level 0 was piece of cake for you now I am keeping my cake in the cage.
&lt;/h3&gt;

&lt;p&gt;Again I start off by pulling strings, and come across a string named &lt;em&gt;"Thats your lucky number !!!"&lt;/em&gt; which is referenced in function &lt;strong&gt;&lt;em&gt;FUN_00401410&lt;/em&gt;&lt;/strong&gt;.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6t6e106ihzywg59ucce2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6t6e106ihzywg59ucce2.jpg" alt="img" width="543" height="54"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After heading to the function where the string was referenced I was presented with this code in the decompiler, as you can see the function takes a parameter as an integer if the parameter is equal to the hex value on line 5, we get the lucky number string that was referenced. All we have to do is convert the hex to decimal to get the answer.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsakzfo1un6sg47gzud53.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsakzfo1un6sg47gzud53.jpg" alt="image alt" width="309" height="208"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Task 3: As a security analyst, you found some suspicious app in your organization which enables employees secretly share their file to the rival organization.  Your task is to find who is involved in this treachery, but the app needs some key to log in. Can you patch this app to bypass Authentication?
&lt;/h3&gt;

&lt;p&gt;After pulling strings from the binary I found one interesting string &lt;em&gt;"Wow Ur At L3?"&lt;/em&gt; after navigating to the function where the string is located (&lt;strong&gt;&lt;em&gt;FUN_004014cb&lt;/em&gt;&lt;/strong&gt;) I was presented with this in the decompiler.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr7hrgl3m2xbmcgse7rle.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr7hrgl3m2xbmcgse7rle.png" alt="image alt" width="383" height="270"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;FUN_0040147f&lt;/em&gt; on line 13 is just an empty function. &lt;strong&gt;&lt;em&gt;FUN_00401410&lt;/em&gt;&lt;/strong&gt; leads to the function that creates the flag string. After navigating to that function, I was presented with this code in the decompiler. I converted all the local variables from hex to ascii to see what value is returned, after doing so I was given the ascii value: &lt;code&gt;1_3L02_shT_t1L_3t13&lt;/code&gt;. So I tried entering that as the flag and it was incorrect so I figured each hex value must be reversed. After reversing the ascii values and running it against the executable, the program printed the &lt;em&gt;"Get Ready For L4 ;)"&lt;/em&gt; string along with the correct flag.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr5lu8trawt502doqg3o1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr5lu8trawt502doqg3o1.png" alt="image alt" width="487" height="416"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Another method of solving this task would be switching the &lt;code&gt;JG&lt;/code&gt; instruction. at address &lt;em&gt;004014d9&lt;/em&gt; we can see there is a comparison between the hex value 0x1 and the 32bit value located at the address &lt;code&gt;[EBP + param_1]&lt;/code&gt;. On the next line we can see if 0x1 was greater than &lt;code&gt;[EBP + param_1]&lt;/code&gt;, then a jump is made to address &lt;em&gt;004014f2&lt;/em&gt;. If you change the JG instruction to JNE or JNZ, the program will move the function that prints the flag since the conditions have changed.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftmdacwau8blr1oaz444x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftmdacwau8blr1oaz444x.png" alt="image alt" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that the jump instruction has been changed, the decompiler should read as follows:&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0idei7e4c3j4ldl535i1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0idei7e4c3j4ldl535i1.png" alt="image alt" width="379" height="292"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Task 4: Bob was fired due to his inappropriate behavior with colleagues. While leaving he deleted the code which decrypts the password stored in the code. As a reverse engineer it's your task to recover that master password since the code is in prod now and cant is modified but you have a copy of the app. everything depends on you now  !!!
&lt;/h3&gt;

&lt;p&gt;After pulling strings I found the string &lt;em&gt;"Rooted !!!"&lt;/em&gt; after heading to the function where the string was located, I was presented with this in the decompiler. Upon examining the code in the decompiler, I was able to make an educated guess at what the functions and variables are. Below are before and after images.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3ju23gb3eh9ya6ltvkp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3ju23gb3eh9ya6ltvkp.png" alt="image alt" width="489" height="417"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fblsoe05fg631h0rbpgrc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fblsoe05fg631h0rbpgrc.png" alt="image alt" width="349" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I only renamed the functions and variables that seemed important to me also I wasn't entirely sure what local_28 is and what line 13 of the code does, but I was still able to solve the challenge without knowing what they are. As for the &lt;strong&gt;&lt;em&gt;xor_string_func&lt;/em&gt;&lt;/strong&gt; was able to come to the conclusion that this was an XOR function seeing how the program behaves in a debugger. I felt the most logical place to set a breakpoint would be at the start of XOR function that way I can see the flag string before it gets ciphered. The XOR function begins at the address &lt;code&gt;00401410&lt;/code&gt;. In x64dbg hit Run until the program reaches the point where it asks you to enter the flag, after entering the wrong flag, step over to the next instruction until the debugger jumps to the XOR function breakpoint. From there continue to step over until you see the flag in the EAX register.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5tn9i79tkxeco5ug0eym.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5tn9i79tkxeco5ug0eym.png" alt="image alt" width="704" height="394"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi8b89qvptwqcv3bb3ljt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi8b89qvptwqcv3bb3ljt.jpg" alt="image alt" width="422" height="168"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Task 5: They are back!!! and using some sort of encryption algorithm to communicate. Although we intercepted their messages we cant decode them, Agent 35711 has successfully stolen their test encryption code. Now it's on you to build a decryptor for test messages and save this world.
&lt;/h3&gt;

&lt;p&gt;Alright, so this time pulling strings returns nothing of value but when executing the program it prints this in the console &lt;strong&gt;&lt;em&gt;"Amcm↨QBu^YP+lD↨V1pvY^BdR"&lt;/em&gt;&lt;/strong&gt; just by looking at this string I can tell it is being encrypted by an algorithm at some point in the program. So I figured since the string is being encrypted and printed to the console, I could see where the &lt;code&gt;printf&lt;/code&gt; function was being used in the program. In Ghidra click on &lt;em&gt;"Display Symbol Tree"&lt;/em&gt; and search for and click &lt;em&gt;"printf"&lt;/em&gt; from there follow the XREF's until you land at the function where the printf function was used &lt;strong&gt;&lt;em&gt;(FUN_00401453)&lt;/em&gt;&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;Once I arrived at the function where printf was reference, I was presented with this in the decompiler. After analyzing the function and comparing it to the programs behavior in the debugger, I was able to make an educated guess at what each variable is. Below are before and after pictures of the function.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1z9mpwbprj2cashlmsol.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1z9mpwbprj2cashlmsol.png" alt="link text" width="519" height="356"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3vyla43jazg6gstq2s7s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3vyla43jazg6gstq2s7s.png" alt="image alt" width="358" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It looks like the function gets the length of the flag, performs a preliminary check on lines 10-11 if the string meets certain requirements, the encryption algorithm is ran against the flag string. Skipping ahead a bit, if you set a breakpoint at the start of the address where the function is located &lt;strong&gt;&lt;em&gt;(00401453)&lt;/em&gt;&lt;/strong&gt;, the flag will be displayed in memory before it is run through the encryption algorithm.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft6pkitk6jz8kqdpxag68.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft6pkitk6jz8kqdpxag68.jpg" alt="image alt" width="800" height="243"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That concludes this write-up if you have any feedback, feel free to comment. Feedback is always appreciated and will help me learn and grow 😊.&lt;/p&gt;

&lt;h1&gt;
  
  
  Connect With Me 😊
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>reverseengineering</category>
      <category>tryhackme</category>
      <category>malwareanalysis</category>
      <category>security</category>
    </item>
    <item>
      <title>TryHackMe - Classic Passwd Writeup</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Tue, 28 Sep 2021 10:37:00 +0000</pubDate>
      <link>https://dev.to/l0wk3y/tryhackme-classic-passwd-3c8f</link>
      <guid>https://dev.to/l0wk3y/tryhackme-classic-passwd-3c8f</guid>
      <description>&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2FSfAaZVa.jpg" width="626" height="626"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Intro
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;"I forgot my password, can you give me access to the program?"&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this TryHackMe room you will be tasked with cracking the password to a binary by bypassing the authentication sequence. There are multiple ways to solve this CTF, but I will go over a few of the ways I solved it.&lt;/p&gt;

&lt;h2&gt;
  
  
  Scenario
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;Practice your skills in reversing and get the flag bypassing the login.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Questions
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Task: What is the flag?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Method 1: Convert the Hex Values to Decimal
&lt;/h3&gt;

&lt;p&gt;To start things off, I pull the strings to find what catches my eye, scrolling through the strings I find &lt;em&gt;THM{ %d%d }&lt;/em&gt;. After doing countless CTFs I already know that flags are typically formatted this way (e.g &lt;em&gt;flag{}, THM{}, htb{}&lt;/em&gt;), &lt;em&gt;%d&lt;/em&gt; is a string format that takes an argument and prints it as an integer we will see that later on in Ghidra. You can read more about %d &lt;a href="https://www.quora.com/What-does-d-mean-in-the-C-programming-language?share=1" rel="noopener noreferrer"&gt;&lt;strong&gt;here&lt;/strong&gt;&lt;/a&gt;.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F005yjxysmsa0ddsatca8.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F005yjxysmsa0ddsatca8.jpg" alt="img" width="308" height="1245"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After importing the file into Ghidra and head over to the main function we can see that two functions are called, &lt;strong&gt;&lt;em&gt;vuln&lt;/em&gt;&lt;/strong&gt; and &lt;strong&gt;&lt;em&gt;gfl&lt;/em&gt;&lt;/strong&gt;. For this method I will only be focusing on the &lt;em&gt;gfl&lt;/em&gt; function. Once in the function we can see the printf function where the flag and the hex arguments that are being formatted into the flag string with &lt;em&gt;%d&lt;/em&gt;. If we convert the hex values to decimal (0x638a78 = &lt;strong&gt;&lt;em&gt;65235128496&lt;/em&gt;&lt;/strong&gt;) and (0x2130 = &lt;strong&gt;&lt;em&gt;8496&lt;/em&gt;&lt;/strong&gt;) then append them to the string we get the full flag &lt;strong&gt;&lt;em&gt;THM{652351284968496}&lt;/em&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2zx6dzd9xyy1ufp9pqf3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2zx6dzd9xyy1ufp9pqf3.png" alt="img" width="621" height="443"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Method 2: ltrace
&lt;/h3&gt;

&lt;p&gt;For the second method I use a command line debugging utility called &lt;a href="https://www.man7.org/linux/man-pages/man1/ltrace.1.html" rel="noopener noreferrer"&gt;&lt;strong&gt;ltrace&lt;/strong&gt;&lt;/a&gt;. After running the binary through ltrace it will ask the user to input the username. After doing so we can see that there is a &lt;em&gt;strcmp&lt;/em&gt; function called with compares the users input to the correct username (&lt;strong&gt;&lt;em&gt;AGB6js5d9dkG7&lt;/em&gt;&lt;/strong&gt;). We can test this by executing the binary again and using the same username from the comparison and we can see that it is valid and prints the flag.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4h3k3mz3qmcngqvuo1ab.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4h3k3mz3qmcngqvuo1ab.jpg" alt="img" width="515" height="539"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Method 3: Swap the Jump Instruction
&lt;/h3&gt;

&lt;p&gt;The third method involves changing the jump instruction that leads to the "&lt;em&gt;Welcome&lt;/em&gt;" message and the flag. In this method we will focus on the &lt;strong&gt;&lt;em&gt;vuln&lt;/em&gt;&lt;/strong&gt; function, this is where the user input is handled along with the if statement that handles the authentication. Below is the if statement and jump condition that handles the authentication. We can see that at address &lt;em&gt;00101261&lt;/em&gt; there is a &lt;strong&gt;&lt;em&gt;JNZ&lt;/em&gt;&lt;/strong&gt; instruction which leads to the address &lt;em&gt;00101271&lt;/em&gt; which prints the &lt;em&gt;Authentication Failure&lt;/em&gt; message.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3jm29ar9gyfhkwgrdszs.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3jm29ar9gyfhkwgrdszs.jpg" alt="img" width="517" height="237"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffzruf4kjxmf3quu4x0ye.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffzruf4kjxmf3quu4x0ye.jpg" alt="img" width="800" height="332"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can bypass this by switching the JNZ condition to JZ and patching the binary, which will essentially have the opposite output than that of the original program. Take a look back at the &lt;em&gt;ltrace&lt;/em&gt; screenshot, you can see that in the original binary for the first comparison the word "&lt;em&gt;test&lt;/em&gt;" was entered and was compared with the expected input the program returned a status code of &lt;em&gt;51&lt;/em&gt;. When the correct username is entered and compared the status code is 0. By swapping the jump condition, the user can input the wrong username, and the program will still print the &lt;em&gt;Welcome&lt;/em&gt; message and flag. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7mvjhyy1xlglgkjopc3n.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7mvjhyy1xlglgkjopc3n.jpg" alt="img" width="521" height="238"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fku5loj5zp7c6p93n5jle.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fku5loj5zp7c6p93n5jle.jpg" alt="img" width="800" height="376"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  I am actively looking for work, feel free to connect with me and lets talk business. Also feedback is appreciated! Thank you!
&lt;/h2&gt;




&lt;h1&gt;
  
  
  Connect With Me 🙂
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tryhackme</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>ctf</category>
    </item>
    <item>
      <title>TryHackMe - OhSINT Writeup</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Sat, 25 Sep 2021 17:53:21 +0000</pubDate>
      <link>https://dev.to/l0wk3y/tryhackme-ohsint-writeup-4e4b</link>
      <guid>https://dev.to/l0wk3y/tryhackme-ohsint-writeup-4e4b</guid>
      <description>&lt;p&gt;&lt;a href="https://i.imgur.com/ld9qJRt.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fi.imgur.com%2Fld9qJRt.png" width="400" height="280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Intro
&lt;/h2&gt;

&lt;p&gt;In this TryHackMe room you will be tasked with gathering intel on a target based on an image, you must use Open Source Intelligence to solve the questions. &lt;/p&gt;

&lt;h2&gt;
  
  
  Scenario
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;What information can you possibly get with just one photo?&lt;/em&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkw83c3kazar72dc205bt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkw83c3kazar72dc205bt.jpg" alt="link text" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Questions
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Q1. What is this users avatar of?
&lt;/h3&gt;

&lt;p&gt;To get started you will need to extra metadata from the photo, this can be done using a tool called &lt;a href="https://exiftool.org/" rel="noopener noreferrer"&gt;&lt;strong&gt;&lt;em&gt;Exiftool&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;. This tool needs to be downloaded but I will be using an online version of this tool called &lt;a href="https://exifmeta.com/" rel="noopener noreferrer"&gt;ExifMeta&lt;/a&gt;. After uploading the image to exifmeta, you will be presented with a list of RAW data pulled from the image's metadata. Right off the bat, I see a few things that catch my eye. XMP-exif:GPSLatitude, XMP-exif:GPSLongitude, and &lt;strong&gt;&lt;em&gt;XMP-tiff:Copyright&lt;/em&gt;&lt;/strong&gt;. After Googling OWoodflint the first result should be a twitter user with the profile picture of a &lt;strong&gt;&lt;em&gt;cat&lt;/em&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;System:FileName&lt;/th&gt;
&lt;th&gt;WindowsXP.jpg&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;System:FileSize&lt;/td&gt;
&lt;td&gt;234081&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;System:FileModifyDate&lt;/td&gt;
&lt;td&gt;2021:09:24 19:18:32+00:00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;System:FileAccessDate&lt;/td&gt;
&lt;td&gt;2021:09:24 19:18:32+00:00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;System:FileInodeChangeDate&lt;/td&gt;
&lt;td&gt;2021:09:24 19:18:32+00:00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;System:FilePermissions&lt;/td&gt;
&lt;td&gt;100644&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:FileType&lt;/td&gt;
&lt;td&gt;JPEG&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:FileTypeExtension&lt;/td&gt;
&lt;td&gt;JPG&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:MIMEType&lt;/td&gt;
&lt;td&gt;image/jpeg&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:ImageWidth&lt;/td&gt;
&lt;td&gt;1920&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:ImageHeight&lt;/td&gt;
&lt;td&gt;1080&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:EncodingProcess&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:BitsPerSample&lt;/td&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:ColorComponents&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;File:YCbCrSubSampling&lt;/td&gt;
&lt;td&gt;2 2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;XMP-x:XMPToolkit&lt;/td&gt;
&lt;td&gt;Image::ExifTool 11.27&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;XMP-exif:GPSLatitude&lt;/td&gt;
&lt;td&gt;54.2947963&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;XMP-exif:GPSLongitude&lt;/td&gt;
&lt;td&gt;-2.2503684&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;XMP-tiff:Copyright&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;&lt;em&gt;OWoodflint&lt;/em&gt;&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Composite:ImageSize&lt;/td&gt;
&lt;td&gt;1920 1080&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Composite:Megapixels&lt;/td&gt;
&lt;td&gt;2.0736&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Composite:GPSLatitudeRef&lt;/td&gt;
&lt;td&gt;N&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Composite:GPSLongitudeRef&lt;/td&gt;
&lt;td&gt;W&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Composite:GPSPosition&lt;/td&gt;
&lt;td&gt;54.2947963 -2.2503684&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h3&gt;
  
  
  Q2. What city is this person in?
&lt;/h3&gt;

&lt;h3&gt;
  
  
  Q3. What's the SSID of the WAP he connected to?
&lt;/h3&gt;

&lt;p&gt;After finding the targets' Twitter account, you will find the user made a tweet with a BSSID. For this question you will need to head over to a site called &lt;a href="https://wigle.net/" rel="noopener noreferrer"&gt;WiGLE&lt;/a&gt; &lt;em&gt;(a website for collecting information about the different wireless hotspots around the world)&lt;/em&gt;. Once on the site enter the BSSID in the map search box and hit &lt;em&gt;"Filter"&lt;/em&gt;. After hitting filter, zoom out on the map and head over to the marked location on the map, once you find the marked location zoom all the way in and you'll find the answers for questions 2 (&lt;strong&gt;&lt;em&gt;London&lt;/em&gt;&lt;/strong&gt;) and 3 (&lt;strong&gt;&lt;em&gt;UnileverWiFi&lt;/em&gt;&lt;/strong&gt;).&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Focl0wwgz7zg1nbc7ovz2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Focl0wwgz7zg1nbc7ovz2.png" alt="img" width="602" height="142"&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F481lgjolwi9poti370wo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F481lgjolwi9poti370wo.png" alt="img" width="232" height="547"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Q4. What is his personal email address?
&lt;/h3&gt;

&lt;h3&gt;
  
  
  Q5. What site did you find his email address on?
&lt;/h3&gt;

&lt;p&gt;The answer to questions 4 and 5 can be found by doing a Google search on the targets username and searching through the each link. Eventually you will come across their &lt;strong&gt;&lt;em&gt;Github&lt;/em&gt;&lt;/strong&gt; page which has an &lt;strong&gt;&lt;em&gt;email&lt;/em&gt;&lt;/strong&gt; on one of their repos.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fin7xjku40bh6la0knbqa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fin7xjku40bh6la0knbqa.png" alt="img" width="800" height="606"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Q6. Where has he gone on holiday?
&lt;/h3&gt;

&lt;h3&gt;
  
  
  Q7. What is this persons password?
&lt;/h3&gt;

&lt;p&gt;The last two questions can be answered by heading over to the targets WordPress blog page, the target states that they are in &lt;strong&gt;&lt;em&gt;New York&lt;/em&gt;&lt;/strong&gt; at that point in time. Their is also hidden text on the page that is colored the same color as the background of the webpage &lt;em&gt;(if you don't have a night mode extension enabled)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fli69983l2pkraq1m0try.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fli69983l2pkraq1m0try.png" alt="img" width="800" height="450"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ry9mjjczuvhs6i7wipw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ry9mjjczuvhs6i7wipw.png" alt="img" width="434" height="69"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This was a really fun room and a great room to test your OSINT skills, OSINT is personally one of my favorite aspects of Cyber Security! 😊&lt;/p&gt;

&lt;h2&gt;
  
  
  I am actively looking for work, feel free to connect with me and lets talk business. Also feedback is appreciated! Thank you!
&lt;/h2&gt;




&lt;h1&gt;
  
  
  Connect With Me 🙂
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ctf</category>
      <category>security</category>
      <category>tryhackme</category>
    </item>
    <item>
      <title>TryHackMe - Dunkle Materie Writeup</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Mon, 20 Sep 2021 12:54:58 +0000</pubDate>
      <link>https://dev.to/l0wk3y/tryhackme-dunkle-materie-writeup-2chb</link>
      <guid>https://dev.to/l0wk3y/tryhackme-dunkle-materie-writeup-2chb</guid>
      <description>&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-V4OSIts6mBY/YUQlhSNm43I/AAAAAAAAAuo/OSjbqWWOh385dEMqZ3GgMXckiCsRJLPmACNcBGAsYHQ/s256/e7db29b3caba5e25bcdc5c049a3ff1cb.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-V4OSIts6mBY%2FYUQlhSNm43I%2FAAAAAAAAAuo%2FOSjbqWWOh385dEMqZ3GgMXckiCsRJLPmACNcBGAsYHQ%2Fs600%2Fe7db29b3caba5e25bcdc5c049a3ff1cb.png" width="256" height="256"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Intro
&lt;/h2&gt;

&lt;p&gt;This blog is a brief writeup of the TryHackMe room &lt;a href="https://tryhackme.com/room/dunklematerieptxc9" rel="noopener noreferrer"&gt;Dunkle Materie&lt;/a&gt; and how to solve each question. This room revolves around using the tool &lt;a href="https://procdot.com/" rel="noopener noreferrer"&gt;ProcDot&lt;/a&gt; to investigate a ransomware attack. Let's begin!&lt;/p&gt;

&lt;h2&gt;
  
  
  Scenario
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;The firewall alerted the Security Operations Center that one of the       machines at the Sales department, which stores all the customers' data, contacted the malicious domains over the network. When the Security Analysts looked closely, the data sent to the domains contained suspicious base64-encoded strings. The Analysts involved the Incident Response team in pulling the Process Monitor and network traffic data to determine if the host is infected. But once they got on the machine, they knew it was a ransomware attack by looking at the wallpaper and reading the ransomware note. Can you find more evidence of compromise on the host and what ransomware was involved in the attack?&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Questions
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Q1. Provide the two PIDs spawned from the malicious executable. (In the order as they appear in the analysis tool)
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-0GgOS6953bM/YUQtIpDG8NI/AAAAAAAAAuw/vayfxgunMJEqAuUpphpcWxQoLfNiVL8DgCNcBGAsYHQ/s690/2021-09-17%2B01_39_08-TryHackMe%2B_%2BDunkle%2BMaterie%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-0GgOS6953bM%2FYUQtIpDG8NI%2FAAAAAAAAAuw%2FvayfxgunMJEqAuUpphpcWxQoLfNiVL8DgCNcBGAsYHQ%2Fs600%2F2021-09-17%252B01_39_08-TryHackMe%252B_%252BDunkle%252BMaterie%252B-%252BBrave.png" width="556" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The first question can be found after uploading the Logfile.CSV and traffic.pcap files from the Analysis Files to ProcDot and selecting the Launcher button to select a process from the list. After doing so a list of processes that were active while procmon was monitoring while be shown. After looking through the list I was able tell these two PIDs (&lt;strong&gt;&lt;em&gt;8644,7128&lt;/em&gt;&lt;/strong&gt;) were spawned from the malicious executable exploreer.exe. It's safe to assume it was given this name so that it could be easily overlooked and would be confused for the actual explorer.exe.&lt;/p&gt;




&lt;h3&gt;
  
  
  Q2. Provide the full path where the ransomware initially got executed?(Include the full path in your answer)
&lt;/h3&gt;

&lt;p&gt;Once ProcDot graphs all active processes and network activity, after looking through the data we can see the file path where exloreer.exe was initially executed. &lt;strong&gt;&lt;em&gt;c:\users\sales\appdata\local\temp\exploreer.exe&lt;/em&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-e0nX4ZxdZFQ/YUQ_lyOkgfI/AAAAAAAAAvA/yY7cFjL_zTEEldz5a7sukbbQ7yI_UVWEgCNcBGAsYHQ/s567/2021-09-17%2B03_04_22-TryHackMe%2B_%2BDunkle%2BMaterie%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-e0nX4ZxdZFQ%2FYUQ_lyOkgfI%2FAAAAAAAAAvA%2FyY7cFjL_zTEEldz5a7sukbbQ7yI_UVWEgCNcBGAsYHQ%2Fs600%2F2021-09-17%252B03_04_22-TryHackMe%252B_%252BDunkle%252BMaterie%252B-%252BBrave.png" width="567" height="127"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Q3. This ransomware transfers the information about the compromised system and the encryption results to two domains over HTTP POST. What are the two C2 domains? (no space in the answer)
&lt;/h3&gt;

&lt;h3&gt;
  
  
  Q4. What are the IPs of the malicious domains? (no space in the answer)
&lt;/h3&gt;

&lt;p&gt;To answer this question you will need to head over to the second instance of the malicious process 7128 after scrolling through the captured data, you'll find a segment where exploreer.exe is sending and receiving a stream of TCP traffic from cisco[.]com, &lt;strong&gt;&lt;em&gt;mojobiden[.]com IP: 146.112.61.108&lt;/em&gt;&lt;/strong&gt; and, &lt;strong&gt;&lt;em&gt;paymenthacks[.]com IP: 206.188.197.206&lt;/em&gt;&lt;/strong&gt;. Based on the flow of the traffic exploreer.exe seems to be sending and receiving data from &lt;em&gt;mojobiden[.]com&lt;/em&gt; it's safe to assume that this is how the threat actor sends commands to the malware and receives data from the victims system. &lt;em&gt;Paymenthacks[.]com&lt;/em&gt; must be where all the data that was collected from the victims system is being sent to based on the flow of the traffic, there is only outgoing traffic being sent to that domain. &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkgl54yehvpe6zpxgldaw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkgl54yehvpe6zpxgldaw.png" alt="img" width="800" height="499"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Q5. Provide the user-agent used to transfer the encrypted data to the C2 channel.
&lt;/h3&gt;

&lt;p&gt;If you right click on the &lt;em&gt;mojobiden&lt;/em&gt; server and click &lt;strong&gt;&lt;em&gt;Follow TCP Stream&lt;/em&gt;&lt;/strong&gt; you can scroll down until you come across information in red text, here you will find the User-Agent information which is &lt;strong&gt;&lt;em&gt;Firefox/89.0&lt;/em&gt;&lt;/strong&gt;. &lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbhpld2iybyx8fl6tjn2h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbhpld2iybyx8fl6tjn2h.png" alt="img" width="361" height="194"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Q6. Provide the cloud security service that blocked the malicious domain.
&lt;/h3&gt;

&lt;p&gt;Going back to the network traffic from question 3&amp;amp;4 there was data being sent to and from a Cisco server with the address &lt;em&gt;23.204.14.115&lt;/em&gt;. If you right click on the Cisco Server bubble you will find &lt;strong&gt;&lt;em&gt;Cisco Umbrella&lt;/em&gt;&lt;/strong&gt; being mentioned in the data. You can read more about Cisco Umbrella &lt;a href="https://umbrella.cisco.com/" rel="noopener noreferrer"&gt;here&lt;/a&gt;. &lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7r4tgsm773n6h1dmuu4w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7r4tgsm773n6h1dmuu4w.png" alt="img" width="373" height="151"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Q7. Provide the name of the bitmap that the ransomware set up as a desktop wallpaper.
&lt;/h3&gt;

&lt;h3&gt;
  
  
  Q8. Find the PID (Process ID) of the process which attempted to change the background wallpaper on the victim's machine.
&lt;/h3&gt;

&lt;p&gt;If you follow the thread &lt;strong&gt;&lt;em&gt;4892&lt;/em&gt;&lt;/strong&gt; created by 7128 you will see that there is a value set in the register path &lt;em&gt;HKCU\Control Panel\Desktop\Wallpaper&lt;/em&gt; the value is c:\programdata\ &lt;strong&gt;&lt;em&gt;ley9kpi9r.bmp&lt;/em&gt;&lt;/strong&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  Q9. The ransomware mounted a drive and assigned it the letter. Provide the registry key path to the mounted drive, including the drive letter.
&lt;/h3&gt;

&lt;p&gt;You can find the answer to this question by following the thread &lt;em&gt;4892&lt;/em&gt; and you will see the registry path for the mounted device. &lt;strong&gt;&lt;em&gt;HKLM\SYSTEM\MountedDevices\DosDevices\Z:&lt;/em&gt;&lt;/strong&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  Q10. Now you have collected some IOCs from this investigation. Provide the name of the ransomware used in the attack. (external research required)
&lt;/h3&gt;

&lt;p&gt;For this question you can look up the C2 servers on threat intel sites like VirusTotal and AlienVault. On VirusTotal enter the C2 address in the VirusTotal search bar and head to the &lt;em&gt;community&lt;/em&gt; tab. This concludes the Dunkle Materie room and I hope you enjoyed this room as much as I did. Happy Hacking! 😊 &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F37rpr3v6mset8bmt6kd0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F37rpr3v6mset8bmt6kd0.png" alt="img" width="800" height="724"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  I am actively looking for work, feel free to connect with me and lets talk business. Also feedback is appreciated! Thank you!
&lt;/h2&gt;




&lt;h2&gt;
  
  
  Connect With Me 🙂
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tryhackme</category>
      <category>ctf</category>
      <category>security</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Network Security &amp; Database Vulnerabilities</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Sat, 18 Sep 2021 00:40:51 +0000</pubDate>
      <link>https://dev.to/l0wk3y/network-security-database-vulnerabilities-16jf</link>
      <guid>https://dev.to/l0wk3y/network-security-database-vulnerabilities-16jf</guid>
      <description>&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-n9EozspLgds/X4hRjzryqWI/AAAAAAAAAbc/WkUoZ0l1QOwum-y81BPLhI7QtLaKuCbSQCNcBGAsYHQ/s0/Introduction%2Bto%2BCybersecurity%2BTools%2B%2526%2BCyber%2BAttacks.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-n9EozspLgds%2FX4hRjzryqWI%2FAAAAAAAAAbc%2FWkUoZ0l1QOwum-y81BPLhI7QtLaKuCbSQCNcBGAsYHQ%2Fs0%2FIntroduction%252Bto%252BCybersecurity%252BTools%252B%252526%252BCyber%252BAttacks.png" width="800" height="418"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;Introduction to the TCP/IP Protocol Framework&lt;/h1&gt;

&lt;p&gt;
  Alright, time to dive into one of the most important parts of cybersecurity.
  NETWORKING! This blog will teach about network basics of TCP/IP and OSI
  models, DNS, DHCP, as well as switching and routing concepts, IP addressing,
  NAT, packet sniffing and finally, structures and vulnerabilities of key
  databases including SQL, CouchDB, Oracle and MongoDB. Let's get started!
&lt;/p&gt;

&lt;h2&gt;Stateless Inspection&lt;/h2&gt;

&lt;p&gt;
  To start off the topic of networking let's discuss what firewalls are and how
  they utilize stateless and stateful inspection, then compare stateless
  firewalls to stateful firewalls. According to Cisco (one of the leading
  companies in network technology) firewalls are
  &lt;a href="https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html" rel="noopener noreferrer"&gt;"A firewall is a network security device that monitors incoming and
    outgoing network traffic and decides whether to allow or block specific
    traffic based on a defined set of security rules. Firewalls have been a
    first line of defense in network security for over 25 years. They establish
    a barrier between secured and controlled internal networks that can be
    trusted and untrusted outside networks, such as the Internet. A firewall can
    be hardware, software, or both."&lt;/a&gt;. Now that we know what a firewall is, let's dig a little deeper into how
  firewalls filter incoming and outgoing network traffic stateless and stateful
  inspection. Regular routers and some firewalls use the stateless way of
  filtering packets, this means the firewall inspects each packet without any
  knowledge of previous packets, the firewall will inspect the destination and
  source address of the packet and then block or restrict addressess that are
  deemed untrusted. There may also be an Access Control List rule (ACL) that
  will determine weather the source addess and destination port of the packet is
  allowed on the network or if the destination address is allowed to be accessed
  or not. A few use cases for stateless inspection include:
  &lt;/p&gt;
&lt;li&gt;Protecting routing engine resources.&lt;/li&gt;
  &lt;li&gt;Controlling traffic going in or out your organization.&lt;/li&gt;
  &lt;li&gt;Troubleshooting purposes.&lt;/li&gt;
  &lt;li&gt;Control traffic routing (through the use of routing instances).&lt;/li&gt;
  &lt;li&gt;Perform QoS/CoS (marking the traffic).&lt;/li&gt;



  &lt;a href="https://1.bp.blogspot.com/-Plax-qDFvd0/X4hqY2HL6zI/AAAAAAAAAbw/1nDrm9sX4m4RzZqN4wBJerbhkN2juDdDQCNcBGAsYHQ/s0/2020-10-15%2B11_26_53-Meet%2B-%2Bpsc-oknk-aor%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-Plax-qDFvd0%2FX4hqY2HL6zI%2FAAAAAAAAAbw%2F1nDrm9sX4m4RzZqN4wBJerbhkN2juDdDQCNcBGAsYHQ%2Fs0%2F2020-10-15%252B11_26_53-Meet%252B-%252Bpsc-oknk-aor%252B-%252BBrave.png" width="800" height="404"&gt;&lt;/a&gt;


&lt;h2&gt;Stateful Inspection&lt;/h2&gt;

&lt;p&gt;
  Heading back over to Cisco, a Stateful Inspection is
  &lt;a href="https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html" rel="noopener noreferrer"&gt;"Now thought of as a “traditional” firewall, a stateful inspection firewall
    allows or blocks traffic based on state, port, and protocol. It monitors all
    activity from the opening of a connection until it is closed. Filtering
    decisions are made based on both administrator-defined rules as well as
    context, which refers to using information from previous connections and
    packets belonging to the same connection."&lt;/a&gt;. In some cases there can be a stateless and stateful inspection, the
  stateless inspection is going to be performed first and then will be followed
  up by an evaluation of the stateful data. Now that we know about stateless and
  stateful inspections what are the pros and cons of each method ? Below is a
  list of the pros and cons of each inspection method courtesy of
  &lt;a href="https://www.cdw.com/content/cdw/en/articles/security/2019/04/29/stateful-versus-stateless-firewalls.html" rel="noopener noreferrer"&gt;CDW&lt;/a&gt;. &lt;br&gt;
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-synnIT0Ty3Q/X4oe7p0iUqI/AAAAAAAAAcU/SXdlNJfdT2EOUzb1M5uYr0LEHANuvA5ugCNcBGAsYHQ/s0/2020-10-16%2B18_29_33-Stateful%2Bvs%2BStateless%2BFirewalls%2B-%2BWhat%2527s%2Bthe%2BDifference_%2B_%2BCDW%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-synnIT0Ty3Q%2FX4oe7p0iUqI%2FAAAAAAAAAcU%2FSXdlNJfdT2EOUzb1M5uYr0LEHANuvA5ugCNcBGAsYHQ%2Fs0%2F2020-10-16%252B18_29_33-Stateful%252Bvs%252BStateless%252BFirewalls%252B-%252BWhat%252527s%252Bthe%252BDifference_%252B_%252BCDW%252B-%252BBrave.png" width="800" height="333"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;IDS and IPS Systems&lt;/h2&gt;

&lt;p&gt;
  Now that we've talked about firewalls and the different types of firewalls,
  let's talk a little about 2 types of firewall filters. Intrusion Detection and
  Intrusion Prevention Systems. An Intrusion Detection System (IDS)
  &lt;a href="https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids" rel="noopener noreferrer"&gt;"is a network security technology originally built for detecting
    vulnerability exploits against a target application or computer."&lt;/a&gt;. Intrusion Prevention Systems (IPS)
  &lt;a href="https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-detection-system-ids" rel="noopener noreferrer"&gt;"extended IDS solutions by adding the ability to block threats in addition
    to detecting them and has become the dominant deployment option for IDS/IPS
    technologies."&lt;/a&gt;.
&lt;/p&gt;



&lt;h2&gt;Intrusion Detection Systems&lt;/h2&gt;

&lt;p&gt;
  An IDS needs to only detect threats on a network, because the IDS only detects
  threats and reports it's finds to an administrator. It is placed outside of
  the real-time communication path of the sender and receiver of information,
  which makes it a passive system. Due to the IDS not keeping up with real-time
  communication it will often take advantage of a TAP or SPAN port to analyze a
  copy of the inline network traffic stream. This ensures that the IDS does not
  impact inline network performance. Unfortunately due to the nature of IDS
  solutions, they lack the ability to prevent a detected exploit from taking
  over the system. Attackers are capable of quickly exploiting vulnerabilities
  once they've infiltrated the network. Rendering the IDS useless.
&lt;/p&gt;



&lt;h2&gt;Intrusion Prevention Systems&lt;/h2&gt;

&lt;p&gt;
  IPS on the other hand, has the ability to block threats along with detecting
  them. The IPS often sits directly behind the firewall and adds a layer of
  analysis that actively searches for dangerous content. The IPS sites inline or
  in the direct path of communication of the sender and receiver and takes
  automated actions on all traffic flows that enter the network. The actions
  performed by an IPS include:
  &lt;span&gt;
    &lt;li&gt;Sending an alarm to the administrator(as would be seen in an IDS)&lt;/li&gt;
    &lt;li&gt;Dropping the malicious packets&lt;/li&gt;
    &lt;li&gt;Blocking traffic from the source address&lt;/li&gt;
    &lt;li&gt;Resetting the connection&lt;/li&gt;
  &lt;/span&gt;
  &lt;br&gt;&lt;span&gt;Since the IPS works as an inline security component, it is crucial that the
    IPS works fast and efficiently to avoid degrading network performance as
    well as detect and respond to exploits accurately since exploits can happen
    in near real time. When it comes to detection methods IPS has a number of
    different detection methods but signiture-base and stistical anomaly-based
    are the two dominant methods. Signature-based detection
    &lt;a href="https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips" rel="noopener noreferrer"&gt;"is based on a dictionary of uniquely identifiable patterns (or
      signatures) in the code of each exploit. As an exploit is discovered, its
      signature is recorded and stored in a continuously growing dictionary of
      signatures. Signature detection for IPS breaks down into two types:"&lt;/a&gt;
    &lt;br&gt;&lt;span&gt;
      &lt;li&gt;
        Exploit-facing signatures identify individual exploits by triggering on
        the unique patterns of a particular exploit attempt. The IPS can
        identify specific exploits by finding a match with an exploit-facing
        signature in the traffic stream
      &lt;/li&gt;
      &lt;li&gt;
        Vulnerability-facing signatures are broader signatures that target the
        underlying vulnerability in the system that is being targeted. These
        signatures allow networks to be protected from variants of an exploit
        that may not have been directly observed in the wild, but also raise the
        risk of false positives.
      &lt;/li&gt;
    &lt;/span&gt;
    Statistical anomaly detection
    &lt;a href="https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips" rel="noopener noreferrer"&gt;"takes samples of network traffic at random and compares them to a
      pre-calculated baseline performance level. When the sample of network
      traffic activity is outside the parameters of baseline performance, the
      IPS takes action to handle the situation."&lt;/a&gt;
  &lt;/span&gt;
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-lJd-kS_8X_c/X7Ml90BKByI/AAAAAAAAAjg/Ao6uFLgMNxswPZbYOu1t726BIxgxyWrJQCNcBGAsYHQ/s0/2020-11-16%2B20_00_53-The%2BDifference%2Bbetween%2BIDS%2Band%2BIPS%2BSystems%2B_%2BCoursera%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-lJd-kS_8X_c%2FX7Ml90BKByI%2FAAAAAAAAAjg%2FAo6uFLgMNxswPZbYOu1t726BIxgxyWrJQCNcBGAsYHQ%2Fs0%2F2020-11-16%252B20_00_53-The%252BDifference%252Bbetween%252BIDS%252Band%252BIPS%252BSystems%252B_%252BCoursera%252B-%252BBrave.png" width="800" height="299"&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h2&gt;Network Address Translation&lt;/h2&gt;

&lt;p&gt;
  NAT or Network Address Translation is essentially a method of converting a
  private IP address to a public IP address when connecting to the Internet. NAT
  remaps the IP address by modifying information in the IP datagram packet
  headers as they transit across a traffic routing device. This is just a
  summerized version of what NAT is but you can read more about it through a FAQ
  form on CISCO's website
  &lt;a href="https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/26704-nat-faq-00.html" rel="noopener noreferrer"&gt;Network Address Translation (NAT) FAQ&lt;/a&gt;. Below is a diagram of a Juniper NAT router and 4 key facts about NAT.
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-HflXfT1qibo/X7MxDAMphWI/AAAAAAAAAjs/GGHpzffkuAUPnMg62TpiXa4NGTWVHI2ywCNcBGAsYHQ/s0/2020-11-16%2B21_09_35-Network%2BAddress%2BTranslation%2B_%2BCoursera%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-HflXfT1qibo%2FX7MxDAMphWI%2FAAAAAAAAAjs%2FGGHpzffkuAUPnMg62TpiXa4NGTWVHI2ywCNcBGAsYHQ%2Fs0%2F2020-11-16%252B21_09_35-Network%252BAddress%252BTranslation%252B_%252BCoursera%252B-%252BBrave.png" width="800" height="635"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-1uf45QYEek4/X7M9Ey_UZlI/AAAAAAAAAj4/QWhlYhsOx7cZj9lsEadV7lWJ1HIBH_yzQCNcBGAsYHQ/s0/2020-11-16%2B22_00_58-Network%2BAddress%2BTranslation%2B_%2BCoursera%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-1uf45QYEek4%2FX7M9Ey_UZlI%2FAAAAAAAAAj4%2FQWhlYhsOx7cZj9lsEadV7lWJ1HIBH_yzQCNcBGAsYHQ%2Fs0%2F2020-11-16%252B22_00_58-Network%252BAddress%252BTranslation%252B_%252BCoursera%252B-%252BBrave.png" width="800" height="355"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  Static, Dynamic, and PAT Address
&lt;/h2&gt;


&lt;li&gt;
    Static NAT- Allows one-to-one mapping between local and global addresses.
  &lt;/li&gt;
  &lt;li&gt;
    Dynamic NAT- A technique in where multiple public IP addresses are mapped to
    a local IP address to be used.
  &lt;/li&gt;
  &lt;li&gt;
    Port Address Translation (PAT) - Maps multiple local IP address to a single
    public address to conserve IP addresses. This method is often referred to as
    &lt;span&gt;"Overloading"&lt;/span&gt;. By using overloading, thousands of users can be
    connected to the Internet by using only one real public IP address.
  &lt;/li&gt;

&lt;h2&gt;
  
  
  I am actively looking for work, feel free to connect with me and lets talk business. Also feedback is appreciated! Thank you!
&lt;/h2&gt;


&lt;h1&gt;
  
  
  Connect With Me 😊
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>vulnerabilities</category>
      <category>networking</category>
    </item>
    <item>
      <title>Introduction to Cybersecurity Tools &amp; Cyber Attacks</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Sat, 18 Sep 2021 00:34:41 +0000</pubDate>
      <link>https://dev.to/l0wk3y/introduction-to-cybersecurity-tools-cyber-attacks-43k3</link>
      <guid>https://dev.to/l0wk3y/introduction-to-cybersecurity-tools-cyber-attacks-43k3</guid>
      <description>&lt;br&gt;
      &lt;a href="https://1.bp.blogspot.com/-Mgd2zUKgWcI/X4VglKLQ5vI/AAAAAAAAAaE/y6ncJf2cY6Us9YyOaMXkZhMZoeBIfCxeACNcBGAsYHQ/s0/Introduction%2Bto%2BCybersecurity%2BTools%2B%2526%2BCyber%2BAttacks.jpeg" rel="noopener noreferrer"&gt;&lt;br&gt;
        &lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-Mgd2zUKgWcI%2FX4VglKLQ5vI%2FAAAAAAAAAaE%2Fy6ncJf2cY6Us9YyOaMXkZhMZoeBIfCxeACNcBGAsYHQ%2Fs0%2FIntroduction%252Bto%252BCybersecurity%252BTools%252B%252526%252BCyber%252BAttacks.jpeg" width="800" height="418"&gt;&lt;br&gt;
      &lt;/a&gt;&lt;br&gt;
    


&lt;p&gt;&lt;br&gt;
    DISCLAIMER: TO AVOID COPYRIGHT INFRINGEMENT I WILL NOT BE REVIEWING EVERY ASPECT OF THIS COURSE. IF YOU WANT TO ACCESS THE FULL COURSE GO TO: &lt;a href="https://www.coursera.org/professional-certificates/ibm-cybersecurity-analyst" rel="noopener noreferrer"&gt;IBM Cybersecurity Analyst Professional Certificate&lt;/a&gt;. ENJOY!&lt;br&gt;
  &lt;/p&gt;


&lt;h1&gt;Introduction to Cybersecurity Tools &amp;amp; Cyber Attacks&lt;/h1&gt;
&lt;br&gt;
  &lt;p&gt;&lt;br&gt;
    In the first of a series of 7 courses within the IBM "Cybersecurity Analyst Professional Certification," you will learn about the current challenges that are occurring within the cybersecurity field. As more and more valuable information and resources that have monetary worth become available, the more security threats and alerts will increase. With this increase in security threats, one would think, &lt;span&gt;"with so many bad guys creating security threats and attacks, there must be a ton of good guys to counter the bad guys, right?".&lt;/span&gt; Well, unfortunately, that is not the case, there is a lack of skilled security professionals in the cybersecurity field. There was a global study conducted by the  Information Systems Security Association (ISSA) and Enterprise Strategy Group (ESG) which states that &lt;a href="http://www.prweb.com/releases/2017/11/prweb14899778" rel="noopener noreferrer"&gt;"the cybersecurity skills shortage is exacerbating the number of data breaches,”&lt;/a&gt; with the top two contributing factors to security incidents being &lt;a href="http://www.prweb.com/releases/2017/11/prweb14899778" rel="noopener noreferrer"&gt;“a lack of adequate training of non-technical employees”&lt;/a&gt; (31%) first and &lt;a href="http://www.prweb.com/releases/2017/11/prweb14899778" rel="noopener noreferrer"&gt;“a lack of adequate cybersecurity staff (22%)”&lt;/a&gt; second. As attacks become more complex, the knowledge that is required to deal with these attacks begins to increase whilst the time we have to deal with the attacks unfortunately decreases. The longer it takes for professionals to respond to attacks, the more it will cost to recover. &lt;/p&gt;




&lt;br&gt;
    &lt;a href="https://1.bp.blogspot.com/-jotfU5Wh9cw/X4aGuEM-TgI/AAAAAAAAAaQ/EWlhHnTou6c5MXxi8vNBnkHtTTKaKAH6ACNcBGAsYHQ/s0/Screenshot%2B%252887%2529.png" rel="noopener noreferrer"&gt;&lt;br&gt;
      &lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-jotfU5Wh9cw%2FX4aGuEM-TgI%2FAAAAAAAAAaQ%2FEWlhHnTou6c5MXxi8vNBnkHtTTKaKAH6ACNcBGAsYHQ%2Fs0%2FScreenshot%252B%25252887%252529.png" width="800" height="123"&gt;&lt;br&gt;
    &lt;/a&gt;&lt;br&gt;
  


&lt;h2&gt;SOC Analyst&lt;/h2&gt;

&lt;p&gt;&lt;span&gt;&lt;br&gt;
    &lt;p&gt;"What is a SOC Analyst and what do they do?"&lt;/p&gt; A Security Operations Center (SOC) Analyst &lt;a href="https://www.csoonline.com/article/3537510/soc-analyst-job-description-salary-and-certification" rel="noopener noreferrer"&gt;"is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure".&lt;/a&gt; A SOC Analyst will also &lt;a href="https://www.csoonline.com/article/3537510/soc-analyst-job-description-salary-and-certification" rel="noopener noreferrer"&gt;"assess security systems and measures for weaknesses and possible improvements."&lt;/a&gt; It is up to the SOC Analyst to use tools for reviewing Security Incident and Event Management (SIEM) and decide which events should recieve a high level of priority over others. You can check out the article &lt;a href="https://www.csoonline.com/article/3537510/soc-analyst-job-description-salary-and-certification" rel="noopener noreferrer"&gt;"SOC analyst job description, salary, and certification"&lt;/a&gt; by Josh Fruhlinger to learn more about what a SOC Analyst does and how you can get a career by becoming a SOC Analyst.&lt;br&gt;
    &lt;br&gt;
      &lt;a href="https://1.bp.blogspot.com/-6EKvi0xodeQ/X4bqwP20drI/AAAAAAAAAac/kEr8TjKNA0kPMc6-KTtbo0O6UbtHX9PXwCNcBGAsYHQ/s0/Screenshot%2B%2528170%2529.png" rel="noopener noreferrer"&gt;&lt;br&gt;
        &lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-6EKvi0xodeQ%2FX4bqwP20drI%2FAAAAAAAAAac%2FkEr8TjKNA0kPMc6-KTtbo0O6UbtHX9PXwCNcBGAsYHQ%2Fs0%2FScreenshot%252B%252528170%252529.png" width="800" height="450"&gt;&lt;br&gt;
      &lt;/a&gt;&lt;br&gt;
    &lt;br&gt;
  &lt;/span&gt;&lt;/p&gt;


&lt;h1&gt;What are We Talking about when We Talk about Cybersecurity?&lt;/h1&gt;


&lt;p&gt;&lt;br&gt;
    In this section we will discuss the definition of cybersecurity, a few key terms and roles within security. Let's get started!&lt;br&gt;
  &lt;/p&gt;


&lt;h2&gt;Information Security&lt;/h2&gt;
&lt;br&gt;
  &lt;p&gt;&lt;br&gt;
    Now I know what you're thinking when it comes to defining the term "Information Security", and if you were thinking something along the lines of "securing information" then you are absolutely right! Information Security, according to the National Institute of Standards and Technology (NIST) is &lt;a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf" rel="noopener noreferrer"&gt;"The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to ensure confidentiality, integrity, and availability."&lt;/a&gt; Within this definition are three importatant key words, "Confidentiality, Integrity, and Availability.". These three words together are known as the "CIA Triad", &lt;span&gt;"but what does confidentiality, integrity, and availability have to do with information security?"&lt;/span&gt; you might ask, well it actually has alot to do with information security, since the CIA triad is practically the building blocks to securing information. Let's get into more detail about what the CIA Traid really means!&lt;br&gt;
  &lt;/p&gt;


&lt;br&gt;
    &lt;a href="https://1.bp.blogspot.com/-CsJZV21WHtI/X4cY3_m2joI/AAAAAAAAAaw/atThz5mNkUoKjGShvxUKYz42eGGUuOSOwCNcBGAsYHQ/s0/Screenshot%2B%2528171%2529.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-CsJZV21WHtI%2FX4cY3_m2joI%2FAAAAAAAAAaw%2FatThz5mNkUoKjGShvxUKYz42eGGUuOSOwCNcBGAsYHQ%2Fs0%2FScreenshot%252B%252528171%252529.png" width="800" height="450"&gt;&lt;br&gt;
    &lt;/a&gt;&lt;br&gt;
  


&lt;h2&gt;The CIA Triad&lt;/h2&gt;
&lt;br&gt;
  &lt;p&gt;&lt;br&gt;
    In the Information Security sub-section I mentioned the CIA Triad and what it is in minor detail, but lets discuss in further detail what the C.I.A in the triad really means.&lt;br&gt;
  &lt;/p&gt;


&lt;h2&gt;
&lt;br&gt;
   Confidentiality &lt;br&gt;
  &lt;/h2&gt;


&lt;p&gt;The dictionary definition of "Confidentiality" is &lt;a href="https://www.dictionary.com/browse/confidentiality" rel="noopener noreferrer"&gt;"The ethical principle or legal right that a physician or other health professional will hold secret all information relating to a patient, unless the patient gives consent permitting disclosure."&lt;/a&gt; of course this is looking at it from a medical standpoint, but I'm sure you get the general idea 😊. Ok let's take Dictionary.com's definition and try to think of confidentiality from a technical standpoint, think about all the data a company has in their database, and we have security professionals taking measures to prevent said data from falling into the wrong hands. That is confidentiality.&lt;br&gt;
  &lt;/p&gt;


&lt;h2&gt;
&lt;br&gt;
   Integrity&lt;br&gt;
  &lt;/h2&gt;


&lt;p&gt;&lt;br&gt;
    By definition Integrity is &lt;a href="https://www.dictionary.com/browse/integrity" rel="noopener noreferrer"&gt;"the state of being whole, entire, or undiminished"&lt;/a&gt;, so think of Integrity as the prevention of data being deleted or modified from an unauthorized source is essentially what Integrity stands for in the triad.&lt;br&gt;
  &lt;/p&gt;


&lt;h2&gt;
&lt;br&gt;
   Availability &lt;br&gt;
  &lt;/h2&gt;


&lt;p&gt;&lt;br&gt;
    Available meaning to be &lt;a href="https://www.dictionary.com/browse/available" rel="noopener noreferrer"&gt;"suitable or ready for use; of use or service; at hand"&lt;/a&gt;, when it comes to security, availability in essence means to have your data always ready to access when needed, by authorized users of course. A few best practices for maintaining availability would include: &lt;/p&gt;
&lt;li&gt;Business Continuity Plans&lt;/li&gt; &lt;li&gt;Disaster Recovery&lt;/li&gt; &lt;li&gt;Redundancy&lt;/li&gt;
&lt;br&gt;
  


&lt;br&gt;
    &lt;a href="https://1.bp.blogspot.com/-2Ix-f24hqtY/X4ddLh_oE9I/AAAAAAAAAbE/2tkeKy9U12MB-AR8BIv6-x03JfTZbpgBQCNcBGAsYHQ/s0/Screenshot%2B%2528172%2529_LI.jpg" rel="noopener noreferrer"&gt;&lt;br&gt;
      &lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-2Ix-f24hqtY%2FX4ddLh_oE9I%2FAAAAAAAAAbE%2F2tkeKy9U12MB-AR8BIv6-x03JfTZbpgBQCNcBGAsYHQ%2Fs0%2FScreenshot%252B%252528172%252529_LI.jpg" width="800" height="450"&gt;&lt;br&gt;
    &lt;/a&gt;&lt;br&gt;
  &lt;br&gt;

&lt;h2&gt;
  
  
  I am actively looking for work, feel free to connect with me and lets talk business. Also feedback is appreciated! Thank you!
&lt;/h2&gt;


&lt;h1&gt;
  
  
  Connect With Me 😊
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>informationsecurity</category>
      <category>cybersecurityawareness</category>
    </item>
    <item>
      <title>How To Get a HackTheBox Invite Code! (Outdated)</title>
      <dc:creator>L0WK3Y | Infophreak</dc:creator>
      <pubDate>Fri, 17 Sep 2021 18:35:08 +0000</pubDate>
      <link>https://dev.to/l0wk3y/how-to-get-a-hackthebox-invite-code-outdated-14i2</link>
      <guid>https://dev.to/l0wk3y/how-to-get-a-hackthebox-invite-code-outdated-14i2</guid>
      <description>&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-8pXwFpH1k8I/X4ylFPxqdxI/AAAAAAAAAcw/d6xYTZO8N3sVyvu6WyU-AXUC2KZuOUYDgCNcBGAsYHQ/s0/hackthebox.png" rel="noopener noreferrer"&gt;&lt;br&gt;
    &lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-8pXwFpH1k8I%2FX4ylFPxqdxI%2FAAAAAAAAAcw%2Fd6xYTZO8N3sVyvu6WyU-AXUC2KZuOUYDgCNcBGAsYHQ%2Fs0%2Fhackthebox.png" width="800" height="213"&gt;&lt;br&gt;
  &lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;How To Get a HackTheBox Invite Code.&lt;/h1&gt;

&lt;p&gt;
  So you want to practice penetration testing, you're looking around on your
  favorite search engine for a few pen-testing labs. Low and behold, you come
  across the holy grail that is
  &lt;a href="hackthebox.eu"&gt;hackthebox&lt;/a&gt;, you're interested in
  joining, so you click the "Join Now" button at the top right of the webpage.
  Expecting to be met with the basic username and password sign up, you're
  greeted with this...
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-NceHp4xvMt0/X4zXFnthSkI/AAAAAAAAAc8/TJw1kSeYvNsPC-7rH5Fad9fvWpfFKv6OgCNcBGAsYHQ/s0/2020-10-18%2B19_58_31-Hack%2BThe%2BBox%2B__%2BCan%2Byou%2Bhack%2Bthis%2Bbox_%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-NceHp4xvMt0%2FX4zXFnthSkI%2FAAAAAAAAAc8%2FTJw1kSeYvNsPC-7rH5Fad9fvWpfFKv6OgCNcBGAsYHQ%2Fs0%2F2020-10-18%252B19_58_31-Hack%252BThe%252BBox%252B__%252BCan%252Byou%252Bhack%252Bthis%252Bbox_%252B-%252BBrave.png" width="361" height="240"&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h1&gt;Challenge Accepted.&lt;/h1&gt;

&lt;p&gt;
  To start things off let's look at the signup/invite page in its entirety.
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-jJriP4WNllw/X4zxAdCQ-uI/AAAAAAAAAdU/Jn57nPGNTnQpFmKI00h0ohsSP2Utmv9uwCNcBGAsYHQ/s0/Screenshot%2B%2528196%2529.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-jJriP4WNllw%2FX4zxAdCQ-uI%2FAAAAAAAAAdU%2FJn57nPGNTnQpFmKI00h0ohsSP2Utmv9uwCNcBGAsYHQ%2Fs0%2FScreenshot%252B%252528196%252529.png" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;
  As you can see there's a "Click Here" button for help, there's a good chance
  you've already clicked the said button and are wondering what to do afterward.
  Head over to Developer Tools by pressing
  &lt;span&gt;F12&lt;/span&gt; or
  &lt;span&gt;CTRL+Shift+I&lt;/span&gt; and head to the
  &lt;span&gt;Console&lt;/span&gt; tab. You will then be greeted by a
  nifty looking banner, here you will see another hint
  &lt;span&gt;"This page loads an interesting javascript file. See if you can find it
    :)"&lt;/span&gt;
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-xEwtZMc6Icg/X41QrkcActI/AAAAAAAAAdo/wUVBzu9A1F0XVoQAgEpb-lCNyVry9xWqQCNcBGAsYHQ/s0/2020-10-19%2B04_36_07-Hack%2BThe%2BBox%2B__%2BCan%2Byou%2Bhack%2Bthis%2Bbox_%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-xEwtZMc6Icg%2FX41QrkcActI%2FAAAAAAAAAdo%2FwUVBzu9A1F0XVoQAgEpb-lCNyVry9xWqQCNcBGAsYHQ%2Fs0%2F2020-10-19%252B04_36_07-Hack%252BThe%252BBox%252B__%252BCan%252Byou%252Bhack%252Bthis%252Bbox_%252B-%252BBrave.png" width="550" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;Getting Closer...&lt;/h1&gt;

&lt;p&gt;
  With another clue to guide us in the right direction, we can now head over to
  the &lt;span&gt;Sources&lt;/span&gt; tab to view the source code for
  the webpage. In the &lt;span&gt;Sources&lt;/span&gt; tab head over
  to the &lt;span&gt;Page&lt;/span&gt; sidebar, there you will find
  the folders &lt;span&gt;css&lt;/span&gt;,
  &lt;span&gt;images&lt;/span&gt;,
  &lt;span&gt;js&lt;/span&gt;. Inside the
  &lt;span&gt;js&lt;/span&gt; folder, you'll find a file that should
  catch your eye and it's titled
  &lt;span&gt;inviteapi.min.js&lt;/span&gt;. I wonder what could be in
  this file... Once inside the file, you'll see a long single line of code,
  you'll want to &lt;span&gt;Pretty-Print&lt;/span&gt; to make the
  code a bit more readable.
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-gMazAz0niOA/X41rijUl4LI/AAAAAAAAAeM/3InF0IqrmHobUCvFcMmeQw013bgUMu3mgCNcBGAsYHQ/s0/2020-10-19%2B06_03_13-NVIDIA%2BGeForce%2BOverlay.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-gMazAz0niOA%2FX41rijUl4LI%2FAAAAAAAAAeM%2F3InF0IqrmHobUCvFcMmeQw013bgUMu3mgCNcBGAsYHQ%2Fs0%2F2020-10-19%252B06_03_13-NVIDIA%252BGeForce%252BOverlay.png" width="800" height="478"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-JPzRO0PG-7s/X41rks7MTiI/AAAAAAAAAeU/C-wWVBZQwiAaSDmEvYz7DwxOA8U6DhdcwCNcBGAsYHQ/s0/2020-10-19%2B06_32_15-Hack%2BThe%2BBox%2B__%2BCan%2Byou%2Bhack%2Bthis%2Bbox_%2B-%2BBrave.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-JPzRO0PG-7s%2FX41rks7MTiI%2FAAAAAAAAAeU%2FC-wWVBZQwiAaSDmEvYz7DwxOA8U6DhdcwCNcBGAsYHQ%2Fs0%2F2020-10-19%252B06_32_15-Hack%252BThe%252BBox%252B__%252BCan%252Byou%252Bhack%252Bthis%252Bbox_%252B-%252BBrave.png" width="316" height="164"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;
  Once &lt;span&gt;Pretty-Print&lt;/span&gt; is enabled, the code
  should look like this...
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;br&gt;
//This javascript code looks strange...is it obfuscated???&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;eval(function(p, a, c, k, e, r) {&lt;br&gt;
    e = function(c) {&lt;br&gt;
        return c.toString(a)&lt;br&gt;
    }&lt;br&gt;
    ;&lt;br&gt;
    if (!''.replace(/^/, String)) {&lt;br&gt;
        while (c--)&lt;br&gt;
            r[e(c)] = k[c] || e(c);&lt;br&gt;
        k = [function(e) {&lt;br&gt;
            return r[e]&lt;br&gt;
        }&lt;br&gt;
        ];&lt;br&gt;
        e = function() {&lt;br&gt;
            return '\w+'&lt;br&gt;
        }&lt;br&gt;
        ;&lt;br&gt;
        c = 1&lt;br&gt;
    }&lt;br&gt;
    ;while (c--)&lt;br&gt;
        if (k[c])&lt;br&gt;
            p = p.replace(new RegExp('\b' + e(c) + '\b','g'), k[c]);&lt;br&gt;
    return p&lt;br&gt;
}('0 3(){$.4({5:"6",7:"8",9:\'/b/c/d/e/f\',g:0(a){1.2(a)},h:0(a){1.2(a)}})}', 18, 18, 'function|console|log|makeInviteCode|ajax|type|POST|dataType|json|url||api|invite|how|to|generate|success|error'.split('|'), 0, {}))&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;
  Now that we have a better idea of what we're looking at, we can observe the
  code a little better. At first glance, the code seems a bit complex, but we
  can still extract a few keywords like:
  &lt;/p&gt;
&lt;li&gt;&lt;span&gt;"makeInviteCode"&lt;/span&gt;&lt;/li&gt;
  &lt;li&gt;&lt;span&gt;"generate"&lt;/span&gt;&lt;/li&gt;
  &lt;li&gt;&lt;span&gt;"success"&lt;/span&gt;&lt;/li&gt;
  &lt;br&gt;


&lt;p&gt;
  Although, if you have some experience in programming, there should be a few
  keywords that also stand out to you, such as:

  &lt;/p&gt;
&lt;li&gt;&lt;span&gt;"ajax"&lt;/span&gt;&lt;/li&gt;
  &lt;li&gt;&lt;span&gt;"POST"&lt;/span&gt;&lt;/li&gt;
  &lt;li&gt;&lt;span&gt;"json"&lt;/span&gt;&lt;/li&gt;
  &lt;li&gt;&lt;span&gt;"url"&lt;/span&gt;&lt;/li&gt;
  &lt;li&gt;&lt;span&gt;"api"&lt;/span&gt;&lt;/li&gt;
  &lt;br&gt;


&lt;p&gt;
  If these 5 keywords look familiar to you, then you probably can guess what is
  coming next 😉,&lt;span&gt;(POST Request)&lt;/span&gt; BUT before
  we get to that there's still one more clue that we missed if you got too
  caught up scratching your brain, trying to figure out what on Earth you're
  looking at. Then you probably looked over the most important clue in all of
  the code...
&lt;/p&gt;

&lt;h2&gt;Obfuscation&lt;/h2&gt;

&lt;p&gt;
  Taking a look back at the code, in the very first line some text is commented
  out reading,
  &lt;span&gt;"This javascript code looks strange...is it obfuscated???"&lt;/span&gt;
  &lt;span&gt;"hmmm... obfuscated??? What does that mean? 🤔&lt;/span&gt; you
  are probably thinking to yourself, well let's take a trip to Dictionary.com.
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-LxrSypOWKWM/X41_wh-LmkI/AAAAAAAAAeo/fhH7GrbTRcAUAv8Xmdq2JKzidMGaVBQ6QCNcBGAsYHQ/s0/obfuscate.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-LxrSypOWKWM%2FX41_wh-LmkI%2FAAAAAAAAAeo%2FfhH7GrbTRcAUAv8Xmdq2JKzidMGaVBQ6QCNcBGAsYHQ%2Fs0%2Fobfuscate.png" width="800" height="360"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;
  In programming, obfuscation is used to
  &lt;span&gt;"to confuse, bewilder, or stupefy."&lt;/span&gt; those who try
  to read the code. With that said now, you're probably thinking
  &lt;span&gt;"how do we deobfuscate the code then?"&lt;/span&gt; For
  deobfuscation we will be using an online tool called
  &lt;a href="https://lelinhtinh.github.io/de4js/" rel="noopener noreferrer"&gt;de4js&lt;/a&gt; by
  &lt;a href="https://github.com/lelinhtinh" rel="noopener noreferrer"&gt;lelinhtinh&lt;/a&gt;, the
  tool is super easy to use, all you have to do is copy and paste the JavaScript
  code into the textbox and click
  &lt;span&gt;Auto Decode&lt;/span&gt;, and BOOM! You have the original
  JavaScript code.
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;br&gt;
function makeInviteCode() {&lt;br&gt;
    $.ajax({&lt;br&gt;
        type: "POST",&lt;br&gt;
        dataType: "json",&lt;br&gt;
        url: '/api/invite/how/to/generate',&lt;br&gt;
        success: function (a) {&lt;br&gt;
            console.log(a)&lt;br&gt;
        },&lt;br&gt;
        error: function (a) {&lt;br&gt;
            console.log(a)&lt;br&gt;
        }&lt;br&gt;
    })&lt;br&gt;
}&lt;br&gt;
&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;
  Now that we can see the original code, we can see that the
  &lt;span&gt;"makeInviteCode"&lt;/span&gt; is actually a function that
  creates the API key, and this is where those 5 programming keywords we
  mentioned early now come into play.
&lt;/p&gt;

&lt;h2&gt;POST Requests&lt;/h2&gt;

&lt;p&gt;
  Within the function we see that ajax is being used,
  &lt;a href="https://en.wikipedia.org/wiki/Ajax_(programming)" rel="noopener noreferrer"&gt;
    "Ajax is a set of web development techniques using many web technologies on
    the client side to create asynchronous web applications. With Ajax, web
    applications can send and retrieve data from a server asynchronously without
    interfering with the display and behaviour of the existing page.
  &lt;/a&gt;

  We can see in the function that, the type of data that Ajax is sending to the
  server is a POST and it is being sent to the url:
  &lt;span&gt;'/api/invite/how/to/generate'&lt;/span&gt;.
  &lt;span&gt;
    Now that we have an idea of what Ajax is doing in the function, let's talk a
    little about what a POST request is and how to make a POST request to the
    server.
  &lt;/span&gt;
  &lt;a href="https://en.wikipedia.org/wiki/POST_(HTTP)" rel="noopener noreferrer"&gt;
    In computing, POST is a request method supported by HTTP used by the World
    Wide Web. By design, the POST request method requests that a web server
    accepts the data enclosed in the body of the request message, most likely
    for storing it.[1] It is often used when uploading a file or when submitting
    a completed web form.
  &lt;/a&gt;
  To make a POST request to the HTB server, we will be using this amazingly easy
  to use tool called &lt;a href="https://reqbin.com/" rel="noopener noreferrer"&gt;reqbin&lt;/a&gt;.
  Simply type the main website URL
  &lt;span&gt;"hackthebox.eu"&lt;/span&gt; into the text field and
  then take the URL from the
  &lt;span&gt;makeInviteCode&lt;/span&gt; function and append them
  this should be your final URL for the POST request:
  &lt;span&gt;hackthebox.eu/api/invite/how/to/generate&lt;/span&gt;
  Now you're all set to send the POST request!
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-3spucOqkBlo/X42zxKaPgaI/AAAAAAAAAe0/Wi9QR4VZKAQTookuYjhCo1dD5EV1iWU7QCNcBGAsYHQ/s0/POST%2Breq.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-3spucOqkBlo%2FX42zxKaPgaI%2FAAAAAAAAAe0%2FWi9QR4VZKAQTookuYjhCo1dD5EV1iWU7QCNcBGAsYHQ%2Fs0%2FPOST%252Breq.png" width="655" height="178"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;
  Once you've sent the POST request you should receive a status code of
  &lt;span&gt;200(OK)&lt;/span&gt; meaning that the request was sent
  successfully, and should also receive data inside of curly brackets. This data
  is called &lt;span&gt;JSON&lt;/span&gt; or
  &lt;span&gt;JavaScript Object Notation&lt;/span&gt; it's essentially
  a data type primarily used to store and transmit data. If you look back to the
  &lt;span&gt;makeInviteCode&lt;/span&gt; function you can see that
  the person who wrote the code is telling Ajax the data type to expect when
  making the POST request is JSON. The JSON data that you received should look
  something like this.
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;br&gt;
{&lt;br&gt;
    "success": 1,&lt;br&gt;
    "data": {&lt;br&gt;
        "data": "SW4gb3JkZXIgdG8gZ2VuZXJhdGUgdGhlIGludml0ZSBjb2RlLCBtYWtlIGEgUE9TVCByZXF1ZXN0IHRvIC9hcGkvaW52aXRlL2dlbmVyYXRl",&lt;br&gt;
        "enctype": "BASE64"&lt;br&gt;
    },&lt;br&gt;
    "hint": "Data is encrypted \u2026 We should probably check the encryption type in order to decrypt it\u2026",&lt;br&gt;
    "0": 200&lt;br&gt;
}&lt;br&gt;
&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;
  Now we are in the home stretch, and time to solve the second to last hint to
  get our invite code.&lt;span&gt;"Data is encrypted. We should probably check the encryption type in order
    to decrypt it."&lt;/span&gt;.
&lt;/p&gt;

&lt;h2&gt;Base64&lt;/h2&gt;

&lt;p&gt;
  Picking up from where we left off, upon inspecting the JSON data we can see an
  attribute called &lt;span&gt;"enctype": "BASE64".&lt;/span&gt;
  &lt;a href="https://base64.guru/" rel="noopener noreferrer"&gt;Base64 is the most popular binary-to-text algorithm used to convert data as
    plain text in order to prevent data corruption during transmission between
    different storage mediums. In addition, it is often used to embed binary
    data into text documents such as HTML, CSS, JavaScript, or XML.&lt;/a&gt;
  (XML has been replaced by JSON). To decrypt the data we will need to use a
  base64 decoder, we could use the many base64 decoders online. Instead, I
  decided to make my own in python just for the fun of it 😁.
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;br&gt;
import base64&lt;br&gt;
import subprocess&lt;br&gt;
from sys import platform&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;def osCheck():&lt;br&gt;
    if platform == "win32":&lt;/p&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;    while True:
        try:
            subprocess.call(['cls'],shell=True) 
            modeSelect = input('Select a conversion mode: \n1: Encode\n2: Decode\n0: Exit\n\nSelection: ')
            if modeSelect == '1':

                def enc():
                    subprocess.call(['cls'], shell=True)
                    userInput = input("Enter plain text here: ")
                    subprocess.call(['cls'], shell=True)

                    """
                    Uses base64 library to encode and decode text
                    https://docs.python.org/3/library/base64.html
                    """
                    b64enc = base64.b64encode(userInput.encode('utf-8'))

                    print('Original Text: ' + userInput + '\n\nEncoded Conversions\n_______________________\n\nBase64 Encoded:', b64enc.decode())

                    input('\n\n\nPress Enter to continue...')

                enc()


            if modeSelect == '2':
                subprocess.call(['cls'],shell=True)
                def b64dec():
                    try:
                        subprocess.call(['cls'], shell=True)
                        userInput = input("Enter encoded text here: ")
                        subprocess.call(['cls'], shell=True)

                        """
                        Uses base64 library to encode and decode text
                        https://docs.python.org/3/library/base64.html
                        """
                        b64dec = base64.b64decode(userInput)

                        print('Converted Text: ' + b64dec.decode() + '\nBase64 Encoded: ', userInput)
                        input('\n\n\nPress Enter to continue...')


                    except:
                        input('Incorrect text format, please enter encoded Base64.\n\nPress enter')
                b64dec()  


            if modeSelect == '0':
                subprocess.call(['cls'], shell=True)
                break

        except KeyboardInterrupt:
            subprocess.call(['cls'], shell=True)
            input('Program Terminated. Press Enter to continue...')
            subprocess.call(['cls'], shell=True)

            break
if platform == "linux" or platform == "linux2" or platform == "darwin":

    while True:
        try:
            subprocess.call(['clear'],shell=True) 
            modeSelect = input('Select a conversion mode: \n1: Encode\n2: Decode\n0: Exit\n\nSelection: ')
            if modeSelect == '1':

                def enc():
                    subprocess.call(['clear'], shell=True)
                    userInput = input("Enter plain text here: ")
                    subprocess.call(['clear'], shell=True)

                    """
                    Uses base64 library to encode and decode text
                    https://docs.python.org/3/library/base64.html
                    """
                    b64enc = base64.b64encode(userInput.encode('utf-8'))

                    print('Original Text: ' + userInput + '\n\nEncoded Conversions\n_______________________\n\nBase64 Encoded:', b64enc.decode())

                    input('\n\n\nPress Enter to continue...')

                enc()


            if modeSelect == '2':
                subprocess.call(['clear'],shell=True)
                def b64dec():
                    try:
                        subprocess.call(['clear'], shell=True)
                        userInput = input("Enter encoded text here: ")
                        subprocess.call(['clear'], shell=True)

                        """
                        Uses base64 library to encode and decode text
                        https://docs.python.org/3/library/base64.html
                        """
                        b64dec = base64.b64decode(userInput)

                        print('Converted Text: ' + b64dec.decode() + '\nBase64 Encoded: ', userInput)
                        input('\n\n\nPress Enter to continue...')


                    except:
                        input('Incorrect text format, please enter encoded Base64.\n\nPress enter')
                b64dec()  


            if modeSelect == '0':
                subprocess.call(['clear'], shell=True)
                break

        except KeyboardInterrupt:
            subprocess.call(['clear'], shell=True)
            input('Program Terminated. Press Enter to continue...')
            subprocess.call(['clear'], shell=True)

            break
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;p&gt;osCheck()&lt;br&gt;
&lt;/p&gt;

&lt;p&gt;
  &lt;a href="https://github.com/L0WK3Y-IAAN/text-converter.py" rel="noopener noreferrer"&gt;text-converter.py | GitHub&lt;/a&gt;&lt;br&gt;&lt;br&gt;

  You try out the script on an online IDE called
  &lt;a href="repl.it"&gt;Repl.it&lt;/a&gt; or of course, you can use an
  online decoder, for this demonstration I will be using the decoder I wrote on
  Repl.it:
  &lt;a href="https://repl.it/@L0WK3Y/FuchsiaTepidProfessional" rel="noopener noreferrer"&gt;L0WK3Y's Text Encoder/Decoder&lt;/a&gt;. Once you are on Repl select the decode mode and then copy and paste the
  encoded data string from the JSON into the terminal, and the script will
  decode the data string for you and give you the last URL string for the last
  POST request to getting the invite code
  &lt;span&gt;/api/invite/generate&lt;/span&gt;. Now it's time to head
  back to &lt;a href="https://reqbin.com/" rel="noopener noreferrer"&gt;reqbin&lt;/a&gt; for the final
  POST request.
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-AGCsFtcAIkg/X43HjRerweI/AAAAAAAAAfI/6Z2bFN-E0I0mNrQKzPccnHi_wnN_CMXBwCNcBGAsYHQ/s0/1.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-AGCsFtcAIkg%2FX43HjRerweI%2FAAAAAAAAAfI%2F6Z2bFN-E0I0mNrQKzPccnHi_wnN_CMXBwCNcBGAsYHQ%2Fs0%2F1.png" width="220" height="109"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-zM3VZSS2QW0/X43Hja4EGbI/AAAAAAAAAfA/gH-i-a6kmNshpjiREPoUe44NabfTUoyGACNcBGAsYHQ/s0/2.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-zM3VZSS2QW0%2FX43Hja4EGbI%2FAAAAAAAAAfA%2FgH-i-a6kmNshpjiREPoUe44NabfTUoyGACNcBGAsYHQ%2Fs0%2F2.png" width="750" height="63"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-e7-cdFjfSF0/X43HjV_Js0I/AAAAAAAAAfE/7WQGdWaK-dgaVhPpjNfGeTLzQOwJ86cngCNcBGAsYHQ/s0/3.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-e7-cdFjfSF0%2FX43HjV_Js0I%2FAAAAAAAAAfE%2F7WQGdWaK-dgaVhPpjNfGeTLzQOwJ86cngCNcBGAsYHQ%2Fs0%2F3.png" width="800" height="80"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;Invite Code Acquired&lt;/h1&gt;

&lt;p&gt;
  We've finally reached the last stage of our quest to getting the invite code
  to &lt;a href="hackthebox.eu"&gt;hackthebox&lt;/a&gt; once you've made a
  POST request to
  &lt;span&gt;hackthebox.eu/api/invite/generate&lt;/span&gt;.
&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;br&gt;
{&lt;br&gt;
    "success": 1,&lt;br&gt;
    "data": {&lt;br&gt;
        "code": "Q0VUQ1EtUk5FRlItT0VES1ktTUtQTk0tSkNaVU4=",&lt;br&gt;
        "format": "encoded"&lt;br&gt;
    },&lt;br&gt;
    "0": 200&lt;br&gt;
}&lt;br&gt;
&lt;/code&gt;&lt;/p&gt;


  &lt;a href="https://1.bp.blogspot.com/-v2FxkEYccYA/X43N_xd1_uI/AAAAAAAAAfc/PiVJ_QHL1Y0pdoIWfN02A2Mt8A_LY1VygCNcBGAsYHQ/s0/inv%2Bcode.png" rel="noopener noreferrer"&gt;&lt;/a&gt;


&lt;p&gt;
  You will receive yet another base64 encoded data string. Just pop that bad boy
  in the text decoder again and you've got your invite code!
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-cqpFSoEwLxw/X43RAZDmnrI/AAAAAAAAAfo/G4CRc4UJnJQD_iQtCpFxixKYu7sEEv2WgCNcBGAsYHQ/s0/inv%2Bcode.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-cqpFSoEwLxw%2FX43RAZDmnrI%2FAAAAAAAAAfo%2FG4CRc4UJnJQD_iQtCpFxixKYu7sEEv2WgCNcBGAsYHQ%2Fs0%2Finv%252Bcode.png" width="466" height="102"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;
  There it is in all of its glory the final key to getting into
  &lt;a href="hackthebox.eu"&gt;hackthebox&lt;/a&gt;, with that said, this
  concluding our journey to getting the invite code for
  &lt;a href="hackthebox.eu"&gt;hackthebox&lt;/a&gt;. I hope you've learned
  a lot from this blog and hope you continue to strive in your cybersecurity
  endeavors. This has been your guide L0WK3Y, and I hope you visit again in
  another learning adventure with me. Happy Hacking! 😊
&lt;/p&gt;

&lt;p&gt;&lt;a href="https://1.bp.blogspot.com/-KUVkp-ebO-c/X43Th3I0t-I/AAAAAAAAAf0/R4zIarmodpQasYQksR-tRpjXOu5j8cmeQCNcBGAsYHQ/s0/l0wk3y%2Bwallpaper.png" rel="noopener noreferrer"&gt;&lt;img alt="" src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2F1.bp.blogspot.com%2F-KUVkp-ebO-c%2FX43Th3I0t-I%2FAAAAAAAAAf0%2FR4zIarmodpQasYQksR-tRpjXOu5j8cmeQCNcBGAsYHQ%2Fs0%2Fl0wk3y%252Bwallpaper.png" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Connect With Me 😊
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://iaansec.com" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DIAANSec%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fiaansec.com%26color%3Dgreen" alt="Website" width="142" height="28"&gt;&lt;/a&gt; &lt;a href="https://dev.to/l0wk3y"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3Ddev.to%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fdev.to%2Fl0wk3y%26color%3Dorange" alt="Website" width="111" height="28"&gt;&lt;/a&gt; &lt;a href="https://github.com/L0WK3Y-IAAN" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DGitHub%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Fgithub.com%2Fl0wk3y%26color%3Dyellow" alt="Website" width="112" height="28"&gt;&lt;/a&gt; &lt;a href="https://www.linkedin.com/in/l0wk3yiaansec" rel="noopener noreferrer"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg.shields.io%2Fwebsite%3Flabel%3DLinkedIn%26style%3Dfor-the-badge%26url%3Dhttps%253A%252F%252Flinkedin.com%2Fin%2Fl0wk3yiaansec%26color%3Dblue" alt="Website" width="148" height="28"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>hacking</category>
      <category>security</category>
      <category>hackthebox</category>
      <category>api</category>
    </item>
  </channel>
</rss>
