-
Notifications
You must be signed in to change notification settings - Fork 35
/
ctfcli.yaml
31 lines (20 loc) · 1.06 KB
/
ctfcli.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
version: "0.1"
id: shop_setup_disclaimer
name: Shop-Setup&Disclaimer
category: DFIR
description: |
Solving this challenge will unlock more "Shop- " challenges in the DFIR category.
All the "Shop- " challenges in the DFIR category use the same JSON data set (`DownUnderShop.JSON`) which can be downloaded from here.
We'd encourage you to use a log analytics tool such as Splunk (1 week free cloud trial) to assist with analysing the logs.
These logs and scenarios are designed to be real-ish, they're simpler and given that the entire data set covers 1hr all malicious activity is conducted on a condensed time frame.
The structure of the fake website being targeted is a basic online store with browsing, purchasing and account functionality.
Flag formats will not be in the standard `DUCTF{}` format, as an example the flag for this challenge is `IAgreeToTheTeasAndTheSeas`.
Feedback is very highly encouraged.
Author: Cake#4096 & Conletz#5420
hosting_type: file
tags:
- easy
files:
- ./publish/DownUnderShop.JSON
flags:
- IAgreeToTheTeasAndTheSeas