blog.itarow.xyz/posts/rip_my_pxe
Preview meta tags from the blog.itarow.xyz website.
Linked Hostnames
11- 7 links toblog.itarow.xyz
- 2 links totwitter.com
- 1 link toaskubuntu.com
- 1 link togetpocket.com
- 1 link togithub.com
- 1 link tonews.ycombinator.com
- 1 link topinterest.com
- 1 link toreddit.com
Search Engine Appearance
https://blog.itarow.xyz/posts/rip_my_pxe
Barbhack 2023 - RIP My PXE - Forensic
Some write up of cool CTF's challenges and infosec content
Bing
Barbhack 2023 - RIP My PXE - Forensic
https://blog.itarow.xyz/posts/rip_my_pxe
Some write up of cool CTF's challenges and infosec content
DuckDuckGo
Barbhack 2023 - RIP My PXE - Forensic
Some write up of cool CTF's challenges and infosec content
General Meta Tags
10- titleBarbhack 2023 - RIP My PXE - Forensic | Itarow
- charsetutf-8
- X-UA-CompatibleIE=edge
- descriptionSome write up of cool CTF's challenges and infosec content
- viewportwidth=device-width, initial-scale=1
Open Graph Meta Tags
4- og:titleBarbhack 2023 - RIP My PXE - Forensic
- og:descriptionHere is the solution of the challenge “RIP My PXE” which I create for barbhack CTF, the challenge is divided in three parts. Step 1 Unfortunately! Our company’s PXE server and our super autoinstall were compromised and our new employees installed their PCs afterwards … Here’s the dump of one of the machines we think has been compromised, please help us understand what the attacker has done. A first backdoor has been inserted so that the attacker can retrieve a shell, please find the domain, the port of the attacker’s C2, as well as the binary that triggers the backdoor.
- og:typearticle
- og:urlhttps://blog.itarow.xyz/posts/rip_my_pxe/
Twitter Meta Tags
3- twitter:cardsummary
- twitter:titleBarbhack 2023 - RIP My PXE - Forensic
- twitter:descriptionHere is the solution of the challenge “RIP My PXE” which I create for barbhack CTF, the challenge is divided in three parts. Step 1 Unfortunately! Our company’s PXE server and our super autoinstall were compromised and our new employees installed their PCs afterwards … Here’s the dump of one of the machines we think has been compromised, please help us understand what the attacker has done. A first backdoor has been inserted so that the attacker can retrieve a shell, please find the domain, the port of the attacker’s C2, as well as the binary that triggers the backdoor.
Link Tags
8- canonicalhttps://blog.itarow.xyz/posts/rip_my_pxe/
- iconhttps://blog.itarow.xyz/images/favicon.ico
- preload/lib/font-awesome/webfonts/fa-brands-400.woff2
- preload/lib/font-awesome/webfonts/fa-regular-400.woff2
- preload/lib/font-awesome/webfonts/fa-solid-900.woff2
Emails
1- ?subject=Barbhack%202023%20-%20RIP%20My%20PXE%20-%20Forensic&body=Check out this article: https%3a%2f%2fblog.itarow.xyz%2fposts%2frip_my_pxe%2f
Links
18- http://reddit.com/submit?url=https%3a%2f%2fblog.itarow.xyz%2fposts%2frip_my_pxe%2f&title=Barbhack%202023%20-%20RIP%20My%20PXE%20-%20Forensic
- http://www.facebook.com/sharer.php?u=https%3a%2f%2fblog.itarow.xyz%2fposts%2frip_my_pxe%2f
- http://www.linkedin.com/shareArticle?url=https%3a%2f%2fblog.itarow.xyz%2fposts%2frip_my_pxe%2f&title=Barbhack%202023%20-%20RIP%20My%20PXE%20-%20Forensic
- http://www.tumblr.com/share/link?url=https%3a%2f%2fblog.itarow.xyz%2fposts%2frip_my_pxe%2f&name=Barbhack%202023%20-%20RIP%20My%20PXE%20-%20Forensic&description=Here%20is%20the%20solution%20of%20the%20challenge%20%26ldquo%3bRIP%20My%20PXE%26rdquo%3b%20which%20I%20create%20for%20barbhack%20CTF%2c%20the%20challenge%20is%20divided%20in%20three%20parts.%0aStep%201%20Unfortunately%21%20Our%20company%26rsquo%3bs%20PXE%20server%20and%20our%20super%20autoinstall%20were%20compromised%20and%20our%20new%20employees%20installed%20their%20PCs%20afterwards%20%26hellip%3b%20Here%26rsquo%3bs%20the%20dump%20of%20one%20of%20the%20machines%20we%20think%20has%20been%20compromised%2c%20please%20help%20us%20understand%20what%20the%20attacker%20has%20done.%20A%20first%20backdoor%20has%20been%20inserted%20so%20that%20the%20attacker%20can%20retrieve%20a%20shell%2c%20please%20find%20the%20domain%2c%20the%20port%20of%20the%20attacker%26rsquo%3bs%20C2%2c%20as%20well%20as%20the%20binary%20that%20triggers%20the%20backdoor.
- https://askubuntu.com/questions/447742/how-do-i-obtain-log-info-from-the-installer