blog.itarow.xyz/posts/rip_my_pxe

Preview meta tags from the blog.itarow.xyz website.

Linked Hostnames

11

Search Engine Appearance

Google

https://blog.itarow.xyz/posts/rip_my_pxe

Barbhack 2023 - RIP My PXE - Forensic

Some write up of cool CTF's challenges and infosec content



Bing

Barbhack 2023 - RIP My PXE - Forensic

https://blog.itarow.xyz/posts/rip_my_pxe

Some write up of cool CTF's challenges and infosec content



DuckDuckGo

https://blog.itarow.xyz/posts/rip_my_pxe

Barbhack 2023 - RIP My PXE - Forensic

Some write up of cool CTF's challenges and infosec content

  • General Meta Tags

    10
    • title
      Barbhack 2023 - RIP My PXE - Forensic | Itarow
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • description
      Some write up of cool CTF's challenges and infosec content
    • viewport
      width=device-width, initial-scale=1
  • Open Graph Meta Tags

    4
    • og:title
      Barbhack 2023 - RIP My PXE - Forensic
    • og:description
      Here is the solution of the challenge “RIP My PXE” which I create for barbhack CTF, the challenge is divided in three parts. Step 1 Unfortunately! Our company’s PXE server and our super autoinstall were compromised and our new employees installed their PCs afterwards … Here’s the dump of one of the machines we think has been compromised, please help us understand what the attacker has done. A first backdoor has been inserted so that the attacker can retrieve a shell, please find the domain, the port of the attacker’s C2, as well as the binary that triggers the backdoor.
    • og:type
      article
    • og:url
      https://blog.itarow.xyz/posts/rip_my_pxe/
  • Twitter Meta Tags

    3
    • twitter:card
      summary
    • twitter:title
      Barbhack 2023 - RIP My PXE - Forensic
    • twitter:description
      Here is the solution of the challenge “RIP My PXE” which I create for barbhack CTF, the challenge is divided in three parts. Step 1 Unfortunately! Our company’s PXE server and our super autoinstall were compromised and our new employees installed their PCs afterwards … Here’s the dump of one of the machines we think has been compromised, please help us understand what the attacker has done. A first backdoor has been inserted so that the attacker can retrieve a shell, please find the domain, the port of the attacker’s C2, as well as the binary that triggers the backdoor.
  • Link Tags

    8
    • canonical
      https://blog.itarow.xyz/posts/rip_my_pxe/
    • icon
      https://blog.itarow.xyz/images/favicon.ico
    • preload
      /lib/font-awesome/webfonts/fa-brands-400.woff2
    • preload
      /lib/font-awesome/webfonts/fa-regular-400.woff2
    • preload
      /lib/font-awesome/webfonts/fa-solid-900.woff2

Emails

1
  • ?subject=Barbhack%202023%20-%20RIP%20My%20PXE%20-%20Forensic&body=Check out this article: https%3a%2f%2fblog.itarow.xyz%2fposts%2frip_my_pxe%2f

Links

18