Stop Terrorist Financing-Operation Bear Treat-Mission 2
Scenario Overview:
A foreign arms dealer has been financing terrorist attacks to help acquire the last components necessary to build a nuclear fission bomb. This includes the latest attack on a French power plant where the terrorists were able to make off with a nuclear centrifuge which we believe will be used to create a nuclear weapon. If we can retrieve a list of his recent banking activity and transactions, we might be able to identify and locate the terrorist organizations before they are able to complete the weapon.
How to be Successful:
The learner will infiltrate a corporate web server used by a shell company and via that server, they should be able to access the arms dealer's personal system and retrieve the records needed. The system is set to purge all transaction records every 10 minutes so the learner must complete the retrieval within that time.
What should you know prior:
Learners should be familiar with basic Linux CLI, network protocols, password cracking, webserver exploits, intrusion detection alerting, and reverse scripting.
Load Time |
Easy: 5 min Medium: 5 min |
Time Limit | 8 hrs |
# of Tasks | 6 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |
Scenario Overview:
A foreign arms dealer has been financing terrorist attacks to help acquire the last components necessary to build a nuclear fission bomb. This includes the latest attack on a French power plant where the terrorists were able to make off with a nuclear centrifuge which we believe will be used to create a nuclear weapon. If we can retrieve a list of his recent banking activity and transactions, we might be able to identify and locate the terrorist organizations before they are able to complete the weapon.
How to be Successful:
The learner will infiltrate a corporate web server used by a shell company and via that server, they should be able to access the arms dealer's personal system and retrieve the records needed. The system is set to purge all transaction records every 10 minutes so the learner must complete the retrieval within that time.
What should you know prior:
Learners should be familiar with basic Linux CLI, network protocols, password cracking, webserver exploits, intrusion detection alerting, and reverse scripting.
Load Time |
Easy: 5 min Medium: 5 min |
Time Limit | 8 hrs |
# of Tasks | 6 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |