Pegasus hacking challenge
Tags
country: | Poland Serbia |
attack-pattern: | Data Hardware - T1592.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Ssh - T1021.004 Trap - T1546.005 Tool - T1588.002 Sudo - T1169 Trap - T1154 |
Common Information
Type | Value |
---|---|
UUID | e525af84-58f7-48cd-a770-a6989ad7083a |
Fingerprint | af75d8130f02d645 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Jan. 4, 2015, midnight |
Added to db | Jan. 18, 2023, 8:58 p.m. |
Last updated | Nov. 11, 2024, 8:12 p.m. |
Headline | Techorganic |
Title | Pegasus hacking challenge |
Detected Hints/Tags/Attributes | 54/2/15 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://blog.techorganic.com/2015/01/04/pegasus-hacking-challenge/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 7 | onetwopunch.sh |
|
Details | Domain | 2 | scanreport.sh |
|
Details | Domain | 4 | sploit.py |
|
Details | Domain | 2 | libc-2.15.so |
|
Details | Domain | 10 | vulnhub.com |
|
Details | File | 13 | s.txt |
|
Details | File | 44 | submit.php |
|
Details | File | 1 | codereview.php |
|
Details | File | 75 | 3-medium.txt |
|
Details | File | 2 | fuzz.php |
|
Details | File | 3 | sploit.py |
|
Details | File | 5 | in.txt |
|
Details | IPv4 | 1 | 192.168.180.130 |
|
Details | IPv4 | 1 | 192.168.180.129 |
|
Details | Url | 1 | http://192.168.180.130:8088/fuzz.php |