Day 39 — Agent T• Walkthrough • TryHackMe
Tags
attack-pattern: | Server - T1583.004 Server - T1584.004 |
Common Information
Type | Value |
---|---|
UUID | 96530d54-9b75-46c0-9e81-1d680e6578bc |
Fingerprint | c932cd4ecc189f24 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | Feb. 22, 2023, 5:32 p.m. |
Added to db | Feb. 22, 2023, 7:23 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Day 39 — Agent T• Walkthrough • TryHackMe |
Title | Day 39 — Agent T• Walkthrough • TryHackMe |
Detected Hints/Tags/Attributes | 19/1/13 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 258 | nmap.org |
|
Details | Domain | 4128 | github.com |
|
Details | Domain | 2 | 0-dev.py |
|
Details | File | 2 | 0-dev.py |
|
Details | File | 198 | flag.txt |
|
Details | Github username | 1 | flast101 |
|
Details | md5 | 1 | 4127d0530abf16d6d23973e3df8dbecb |
|
Details | IPv4 | 1 | 10.10.31.128 |
|
Details | IPv4 | 4 | 10.17.10.53 |
|
Details | Url | 132 | https://nmap.org |
|
Details | Url | 92 | https://nmap.org/submit |
|
Details | Url | 1 | https://github.com/flast101/php-8.1.0-dev-backdoor-rce.git |
|
Details | Url | 1 | http://10.10.31.128 |