Posts

Showing posts with the label SANS

Fun with Flags - Sans Holiday Hack 2017 Challenge 3

Image
Read Time: 10 Minutes Keeping to the " Fun with Flags ", this post will demonstrate how I solved the third challenge for the  SANS Holiday Hack 2017 .  Building on the content in my last couple posts, see  Challenge 1  and Challenge 2 , I demonstrate how the Console Challenge was solved and any hacking required to capture the actual flag. Figure 1: Fun with Flags Staarfaenger For Challenge 3 the following question is posed:  "The North Pole engineering team uses a Windows SMB server for sharing documentation and correspondence. Using your access to the Letters to Santa server, identify and enumerate the SMB file-sharing server. What is the file server share name?" The hint "...please see Holly Evergreen in the Cryokinetic Magic Level" is provided.  So heading over to the challenge we try to locate our first terminal which can be seen in  Figure 2: Finding the Third Terminal. Figure 2: Finding the Third Terminal After a left click y...

Fun with Flags - Sans Holiday Hack 2017 Challenge 1

Image
Read Time: 10 Minutes Through the course of a year I participate in a number of Cyber Security Capture the Flags  (CTFs) events.  So in this posting, and others titled " Fun with Flags ", I plan to capture how I solved the different challenges that are presented.  To keep the blog light I will narrate only a challenge at a time.  It is important to blog about this topic since CTFs allow for DFIR Professionals to experience new challenges.  These challenges require the skills they have but the content might not match their day-to-day on the job challenges.   Figure 1: Fun with Flags Staarfaenger At the end of each year (since 2010 ?), SANS hosts their Holiday Hack Challenge.  These challenges so far have a had a Christmas Theme wrapped around them.  During the 2017 Holiday Hack Challenge  nine major questions were posed to participants.  I will scope the content of this post to the console challenges and hacking.  The c...