🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Briefing L02 C03
  • Traffic Jam
  • Flag Capture
  • Scoreboard
  1. WiCYS CyberStart
  2. Chapter 2 - Tokyo Patterns of Behaviour

WiCYS CyberStart (Tokyo) Challenge 3

A simple challenge, involving changing of a URL destination, to find a hidden webpage.

PreviousWiCYS CyberStart (Tokyo) Challenge 2NextWiCYS CyberStart (Tokyo) Challenge 4

Last updated 3 years ago

Briefing L02 C03

Traffic Jam

Can you believe it, we think the Yakoottees are now planning to disrupt the flow of traffic in a major city! We need to find the URL of a forum they’re using to communicate with each other. Can you figure out what the URL is?

Tip: Find the url of the forum to get the flag.

Visiting the Yakoottees’ website, this is what we find:-

While visiting each page, it has different URLs, which is evident in the images below. This is very important to observe. Keep it in mind

Putting this into a tabular form, we have:-

Prefix
Section of the Website

company

About

my-routes

Cycling Maps

contact

Contact Us

In each case, a prefix is attached to the main URL (trafficdisruptors.com)

Flag Capture

To get a full list, we can observe the source code of the webpage. Sometimes analyzing this is akin to a gold mine

So we can observe that “forum” has a prefix — my-chat

Appending it to the main URL, we get the final URL, targeting the forum page

Upon pressing enter, we capture the flag

Flag — WiNlHGVYPAm0iGig5lhu

Contents of the forum page:-

Scoreboard

The challenge is conquered and we have racked up 1000 points on the scoreboard. Way to go!

()

💒
https://my-chat.trafficdisruptors.com/312324494