Description
The machine under investigation is connected to a web server at the address 10.42.42.132
.
The web server is protected using a simple uthentification (HTTP auth
).
Recover the username and the password of this connexion.
Note : The flag follows the format: FCSC{username:password}
.
This challenge has been split into seven parts:
- Académie de l’investigation - C’est la rentrée.
- Académie de l’investigation - Administration.
- Académie de l’investigation - Premiers artéfacts.
- Académie de l’investigation - Porte dérobée.
- Académie de l’investigation - Rédaction.
- Académie de l’investigation - Partage.
- Académie de l’investigation - Dans les nuages.
Files
-
dmp.mem.tar.xz
155.40 MiB – a6b98f7b21cdc81ed319ff158bf4e56d885546fd1f98e860ef622066b0951fff
Author
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.