- [Day 24] The Confrontation Jolly Judgment Day
- [Day 24] Mobile analysis You Are on the Naughty List, McGreedyOne of the photos contains a flag. What is it? What name does Tracy use to save Detective Frost-eau’s phone number? One SMS exchanged with Van Sprinkles contains a password. What is it?
- [Day 23] Coerced Authentication Relay All the WayWhat is the name of the AD authentication protocol that makes use of tickets? What is the name of the AD authentication protocol that makes use of the NTLM hash? What is the name of the tool that can intercept these authentication challenges? What is the password that McGreedy set for the Administrator account? What is the
- [Day 22] SSRF Jingle Your SSRF Bells: A Merry Command & Control HackventureIs SSRF the process in which the attacker tricks the server into loading only external resources (yea/nay)? What is the C2 version? What is the username for accessing the C2 panel? What is the flag value after accessing the C2 panel? What is the flag value after stopping the data exfiltration from the McSkidy computer?
- [Day 21] DevSecOps Yule be Poisoned: A Pipeline of Insecure Code!What Linux kernel version is the Jenkins node? What value is found from /var/lib/jenkins/secret.key?