Module 7: Threat Hunting Challenge Labs
Last updated
Last updated
Context.
The Challenge Labs and Exam consist of a list of questions that you need to answer by successfully conducting the assigned threat hunt. Instead of directly entering the answers, such as timestamps, hash values, or object names, you are required to input them into the application located at C:\Users\offsec\Desktop\flags.exe on the DEV machine. This application generates a hash based on your input that you can submit as an answer.
To verify the correctness of your answer's format, each exercise includes a list of 10 hash values. After generating a hash with flags.exe, you should compare it against the provided list to ensure your input format is accurate. If your hash does not match any on the list, it indicates either an incorrect answer or format error.
For exercises that ask for file hashes, submit the SHA-256 hash, not the MD5 hash, which may also be present in the event data.