У нас вы можете посмотреть бесплатно Memory Challenge 18: Reminiscent или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
We're testing our Memory Analysis package (currently in beta: https://cerbero.io/packages/memoryana...) against various challenges available online. We found this challenge on Hack The Box (https://app.hackthebox.com/challenges..., so credit goes to them for creating it. The scenario is as follows: "Suspicious traffic was detected from a recruiter's virtual PC. A memory dump of the offending VM was captured before it was removed from the network for imaging and analysis. Our recruiter mentioned he received an email from someone regarding their resume. A copy of the email was recovered and is provided for reference. Find and decode the source of the malware to find the flag." We tried to find the flag by decoding the malicious PowerShell stages, but since we couldn't download the payload from the final IP, we simply performed a string search and found the flag. Easy peasy.