Académie de l'investigation - Porte dérobée

forensics memory linux FCSC 2020 solved on

star

Description

A remote machine is connected to the machine under analysis through a backdoor, with the ability to run arbitrary commands.

Questions:

  • What is the port number listenning for this connexion?
  • What is the remote IP address connected during the dump?
  • What is the timestamp of the creation of the processus in UTC?

Note : The flag follows the format: FCSC{port:IP:YYYY-MM-DD HH:MM:SS}.

This challenge has been split into seven parts:

Files

  • dmp.mem.tar.xz
    155.40 MiB – a6b98f7b21cdc81ed319ff158bf4e56d885546fd1f98e860ef622066b0951fff

Author

alx

Flag

Share my success on Fediverse, Twitter, Linkedin, Facebook, or via email.

Submit your solution

You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.

You need to be logged in to submit a writeup.

Writeups

I've been looking for a long time and I still can't find the flag!

You can vote for the solutions you prefer by using the on their respective pages.

DateAuthor Language Tags Vote
2024-05-04
lrstx
🇫🇷