Académie de l'investigation - Dans les nuages

forensics memory linux FCSC 2020 solved on

star star star

Description

The machine under investigation is connected to a web server at the address 10.42.42.132. The web server is protected using a simple uthentification (HTTP auth). Recover the username and the password of this connexion.

Note : The flag follows the format: FCSC{username:password}.

This challenge has been split into seven parts:

Files

  • dmp.mem.tar.xz
    155.40 MiB – a6b98f7b21cdc81ed319ff158bf4e56d885546fd1f98e860ef622066b0951fff

Author

alx

Flag

Share my success on Fediverse, Twitter, Linkedin, Facebook, or via email.

Submit your solution

You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.

You need to be logged in to submit a writeup.

Writeups

I've been looking for a long time and I still can't find the flag!

You can vote for the solutions you prefer by using the on their respective pages.

DateAuthor Language Tags Vote
2024-05-13
._nofix
🇬🇧