Posts: 16
Threads: 2
Joined: Jul 2024
Aug 03, 2024, 11:07 AM
(This post was last modified: Aug 03, 2024, 11:08 AM by yolocalman.)
Hello, can somebody help me with the challenge, i found all the broken symlinks but cant do shit with them.
Thanks in advance.
Posts: 16
Threads: 2
Joined: Jul 2024
Posts: 28
Threads: 0
Joined: Dec 2023
Solution belwo.........
This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 42
Threads: 2
Joined: Aug 2023
Posts: 28
Threads: 0
Joined: Dec 2023
lololol i give answer, but dont get credits for unlocks ????... This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 35
Threads: 0
Joined: Dec 2023
thanks for solution. i was trying to solve it. got stuck on a basic point
Posts: 1
Threads: 0
Joined: Sep 2024
Sep 09, 2024, 02:28 PM
(This post was last modified: Sep 09, 2024, 02:54 PM by Fl0W.)
any hints to start with this challange to identify the rootkit?
thanks!
OK, got it  If you want some hints:
the flag/toolkit is in: /var
check the file: ls /usr/lib/x86_64-linux-gnu
move the rootkit: mv /usr/lib/x86_64-linux-gnu/libc.hook.so.6 /tmp
search for the flag: find / -name "flag*"
you will find the flag here: /var/pr3l04d_/flag.txt
have fun with it
Posts: 221
Threads: 16
Joined: Aug 2023
You need a virtual machine analyser.
That is best for.There are lots of QEMU forks for that
Posts: 54
Threads: 4
Joined: Feb 2024
(Sep 09, 2024, 02:28 PM)Fl0W Wrote: any hints to start with this challange to identify the rootkit?
thanks!
OK, got it If you want some hints:
the flag/toolkit is in: /var
check the file: ls /usr/lib/x86_64-linux-gnu
move the rootkit: mv /usr/lib/x86_64-linux-gnu/libc.hook.so.6 /tmp
search for the flag: find / -name "flag*"
you will find the flag here: /var/pr3l04d_/flag.txt
have fun with it 
Thanks for sharing the hint ! Appreciate it
Posts: 221
Threads: 16
Joined: Aug 2023
(Sep 11, 2024, 07:37 AM)kewlsunny Wrote: (Sep 09, 2024, 02:28 PM)Fl0W Wrote: any hints to start with this challange to identify the rootkit?
thanks!
OK, got it If you want some hints:
the flag/toolkit is in: /var
check the file: ls /usr/lib/x86_64-linux-gnu
move the rootkit: mv /usr/lib/x86_64-linux-gnu/libc.hook.so.6 /tmp
search for the flag: find / -name "flag*"
you will find the flag here: /var/pr3l04d_/flag.txt
have fun with it 
Thanks for sharing the hint ! Appreciate it
Well this tactic works on some of them.
But if you want to really analyse whats going on ,
you can use Panda VM ! which is based on Qemu VM
|