Stop Terrorist Financing-Operation Bear Treat-Mission 2
Rated 3.5/5 based on 11 customer reviews

Stop Terrorist Financing-Operation Bear Treat-Mission 2

Available: In Stock
$0.00

Image

Scenario Overview: 

A foreign arms dealer has been financing terrorist attacks to help acquire the last components necessary to build a nuclear fission bomb. This includes the latest attack on a French power plant where the terrorists were able to make off with a nuclear centrifuge which we believe will be used to create a nuclear weapon. If we can retrieve a list of his recent banking activity and transactions, we might be able to identify and locate the terrorist organizations before they are able to complete the weapon.

How to be Successful:

The learner will infiltrate a corporate web server used by a shell company and via that server, they should be able to access the arms dealer's personal system and retrieve the records needed. The system is set to purge all transaction records every 10 minutes so the learner must complete the retrieval within that time.

What should you know prior:

Learners should be familiar with basic Linux CLI, network protocols, password cracking, webserver exploits, intrusion detection alerting, and reverse scripting.


OFFENSIVE
Click For Video
Load Time

Easy: 5 min

Medium: 5 min

Time Limit 8 hrs
# of Tasks 6
Hints Yes
Save Session Yes
Team Based Yes

Scenario Overview: 

A foreign arms dealer has been financing terrorist attacks to help acquire the last components necessary to build a nuclear fission bomb. This includes the latest attack on a French power plant where the terrorists were able to make off with a nuclear centrifuge which we believe will be used to create a nuclear weapon. If we can retrieve a list of his recent banking activity and transactions, we might be able to identify and locate the terrorist organizations before they are able to complete the weapon.

How to be Successful:

The learner will infiltrate a corporate web server used by a shell company and via that server, they should be able to access the arms dealer's personal system and retrieve the records needed. The system is set to purge all transaction records every 10 minutes so the learner must complete the retrieval within that time.

What should you know prior:

Learners should be familiar with basic Linux CLI, network protocols, password cracking, webserver exploits, intrusion detection alerting, and reverse scripting.


OFFENSIVE
Click For Video
Load Time

Easy: 5 min

Medium: 5 min

Time Limit 8 hrs
# of Tasks 6
Hints Yes
Save Session Yes
Team Based Yes