The Hacker Voice Community Forums: Challenge 6 - The Hacker Voice Community Forums

Jump to content

Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic

Challenge 6

#1 User is offline   Belial 

  • The King of Ping
  • PipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPipPip
  • Group: Admin
  • Posts: 2,715
  • Joined: 09-September 05
  • Gender:Male
  • Location:the land of gray skys
  • Interests:Talking. Hacking, porn. (not in that order)
  • Operating System:Debian /xp/ and making my own Pr0nOS-vxxx
  • Ninja or Pirate?:Pirate

Posted 06 January 2013 - 05:42 PM


Firstly - thanks to all those who have attempted all the challenges so far. As far as I know only Napalm has completed 5. I am really glad people are enjoying these.

So here is challenge 6. A little different this time. Still with the malware theme.

You are part of a elite cyber response team. A hackerdoodle has owned up some ones computers. A Jedi master found the source of the attack a Windows XP SP3 workstation. You have been given a memory dump to examine.

To complete this challenge you need to be able to clearly demonstrate how and what you did explore the memory dump and locate the compromise method and what the hacker did. If you are able to extract any malware or identify the hacker methods you get extra points.

this is a tough one for noobs so feel free to read up and take it a step at a time.

Hit me up on IRC if you want any more hints.


File info: 
MD5 (dump.mem) = 3b81ea1f2b790429c14f1bf84db8d333

Get the file here

Share this topic:

Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic

1 User(s) are reading this topic
0 members, 1 guests, 0 anonymous users