251030_dragosCTF learning record

In the full-stack CTF player program, this article will be continuously updated with recreated learning content

Contact Authors

Your Partner in OT Cybersecurity | Dragos

Attachments

Release 251030_dragosCTF · cvestone/cvestone.github.io · GitHub

EventInfo

2025 Dragos Capture the Flag (CTF) Competition Summary & Results | Dragos

Dragos Trivia

Dragos Trivia - Q1

Desc

The 9th Annual Year In Review OT/ICS Cybersecurity Report (2025) report summarizes cybersecurity headlines, the ICS/OT threat landscape, case studies from the Dragos frontlines, and security trends seen at industrial organizations. Dragos tracked 23 threat groups targeting industrial control organizations.

How many threat groups were active in 2024?

▼ View Hint
Head over to the Dragos website and look at the resources.


Dragos Trivia - Q2

Desc

Which Ransomware group was the sixth most active group that Dragos tracked in 2024?


Dragos Trivia - Q3

Desc

Dragos tracked new Threat Groups in 2024. Which new Threat Group has been known to affect the Rail Industry?


Dragos Trivia - Q4

Desc

Investigators found that attackers gained access to ACME’s vendor network through a phishing email targeting a contractor, allowing lateral movement into poorly segmented industrial systems.

What critical security control, as defined by the 5CCs, could have prevented this attack from escalating into an OT compromise, according to Dragos’s guidance on KAMACITE?

▼ View Hint
Open YIR

▼ View Hint
Review the KAMACITE Technical Update

▼ View Hint
Review the SANS ICS 5 Critical Controls


Phishing & Initial Access

Undercover Ops(√)

Desc

Use the attached PCAP to answer the next two questions.

Sophia, a project manager at ACME Corp., just received an email from her “IT team”, informing her that her current Windows 10 host needs to be updated to the latest, approved OS - Windows 11. The “IT team” placed proper instructions in her Downloads directly and asked Sophia to follow the necessary steps to complete the update.

Reviewing the PCAP will show that multiple files were transferred across the network. What was the first filename transferred onto Sophia’s host?

▼ View Hint
Is there a place in Wireshark where we can view transferred files?

Key Points:SMB Protocol Traffic Analysis (Object Export)


Based on the hint to look for protocols related to network file transfers, the first ones that come to mind are FTP and SMB. Let’s first check the protocol hierarchy:
image.png
Clearly, only SMB is present. We can directly export the SMB objects:
image.png

This already reveals all the downloaded filenames. According to the chronological order, the first file is as follows:
image.png

Where are you going?

Desc

During the investigation, the ACME IR team identified that two files were shared with Sophia: the original PDF and an EXE. The EXE was never meant to upgrade the operating system to Windows 11, but rather it hosted a malicious, reverse-shell payload.

What IP Address and Port did this payload call back to?

Flag Format: IPAddress:Port

▼ View Hint
Wireshark supports communication statistics

Key Points:Analysis of Malicious Software Reverse Shell Traffic


Still working with the file from the previous chall.
Clearly, this involves malware analysis. Following the hint and conventional approaches, go to Statistics -> Conversations:
You can first sort by the Duration of the conversations. The longest duration might indicate potential malicious activity:
image.png
Here, observing Address B, the first row is an internal IP, which is unlikely to be the callback target for a reverse shell. From an attacker’s perspective, it’s usually an external IP. Therefore, the likely candidate is 15.87.58.2:

ICS Windows Event Log Analysis

Home Improvement

Desc

A victim organization provided two Windows Event log files that they believe contain crucial logs containing information that shows how the adversaries brought offensive tools into the environment. They have provided you with these files for analysis.

What living-off-the-land tool did the adversary use to help bring a tool into the environment?

flag format: flag[xxxxxxxxxx] or xxxxxxxxxx

▼ View Hint
SABLOL

Key Points:


College, it ain’t easy

Desc

After identifying the technique the Ember Jackals used to transfer an offensive tool into the environment, we still don’t know what the tool is or what it does. Adversaries often rename or obfuscate tools to evade defenses.

However, there’s a way to recover the tool and identify its true name and function. Use the Security.evtx, PowerShellLogs.evtx, or PowerShellLogs.csv files to identify the tool.

What is the codename of the tool the adversary transferred into the environment?

Flag Format: flag[lots of strings]

▼ Unlock Hint for 1 point

The adversary already used the command to reassemble the executable. You just have to replicate it.

▼ Unlock Hint for 1 point

This problem can be solved manually, but that will be an incredibly tedious task with 1009 sections. Try automating your analysis.

Key Points:


ICS PCAP Analysis

Network Capture INT

Desc

Would you kindly identify the full Operating System name, version, and build number of the client machine that this PCAPNG was captured on?

Flag Format: xx-bit Windows xx (xxxx), build xxxxx

Free Hint: There are more than one interface and there are multiple builds in the attached PCAP.

▼ View Hint
Every packet is captured from a specific Interface id.

▼ View Hint
Each Interface device has its own Interface Description Block.

Key Points:


First of Many

Desc

The Ember Jackals have corrupted a.txt file that was retrieved over the network by one of our admins.

We need to identify the .txt file and extract out any hidden messages the Ember Jackals have graffitied inside.

Flag Format: LONGSTRINGALLTOGETHER

▼ View Hint
There is a way to extract files detected by Wireshark in the UI.

▼ View Hint
Finding the file transfer in Wireshark may be helpful to see what is going on.

▼ View Hint
The file extension of the file in question is “.txt”.

▼ View Hint
Concatenate multiple messages together, if any.

Key Points:


Corrupted Network Capture

Desc

Ember Jackals have corrupted a network capture file that may contain information on when they first began gathering info about our network. Help us restore the file to working order and recover the response data in the protocol capture.

What is the timestamp of the response packet?

Flag Format: Mmm DD, YYYY HH:MM:SS

▼ View Hint
It looks like the beginning portion of the file is corrupted

▼ View Hint
Recover or recreate a Section Header Block

▼ View Hint
The timestamp must be set to the correct epoch (What epoch value does the TIME protocol use?)

▼ View Hint
wireshark/epan/dissectors/packet-time.c at 8bbd491f0f39640e9ff84ec608e77e80b5021b93 · wireshark/wireshark · GitHub

Key Points:


Silly Jackals, PCAPs are for Kids!

Desc

Ember Jackals have been probing some of our other servers. I have been able to capture some of their traffic but I think I messed up the capture somehow.

Please help make sense of the data and retrieve the ‘Originate Timestamp’ field from the ICMP packet so we can identify the time of day this scan occurred.

Flag Format: dddddddd

▼ Unlock Hint for 1 point

Network captures record the LinkType the frames were captured on

▼ Unlock Hint for 1 point

ICMP packets only operate on Ethernet network links

▼ Unlock Hint for 1 point

The LinkType field for the correct Interface ID needs to be fixed

Key Points:


Binary Analysis

Mortimer’s Admin Utility 1

Desc

Note: Use this attachment to solve the next three challenges.

In a strange turn of events, the Ember Jackals hired a young Mortimer Smith as an intern and ACME found a utility he left behind on one of the systems.

First, we need to do some static analysis to make sure there’s no flag-nanigans going on here…

▼ Unlock Hint for 0 points

Running it may be dangerous… you should just look at it.

▼ Unlock Hint for 0 points

This is way simpler than string theory.

Key Points:


Mortimer’s Admin Utility 2

Desc

In a strange turn of events, the Ember Jackals hired a young Mortimer Smith as an intern and ACME found a utility he left behind on one of the systems.

Yeah it’s definitely shady, and you should definitely not run it on your work computer… but you need the flag so… YOLO!

Note: A successful run of the tool will create a new local user (if run in Admin prompt). Creation of a new user, nor Admin privileges are required to solve the flag.

Flag Format: flag{strings here}

▼ View Hint
Hey, uh, uh, 1995 called! They want their “certain year called wanting its blank back” formula back.

Key Points:


Mortimer’s Admin Utility 3

Desc

In a strange turn of events, the Ember Jackals hired a young Mortimer Smith as an intern and ACME found a utility he left behind on one of the systems.

Oh geez… I really need to get Morty’s password. Can you retrieve it?

Flag Format: flag(datahere)

▼ Unlock Hint for 1 point

Good luck bruteforcing it…. we’ll check back with you at DISC 2030.

Key Points:


Reverse Engineering & PCAP Analysis

Kiddy Tags - 1

Desc

A security researcher alerted ACME Corp about proprietary information circulating on the dark web. You received a sample and immediately recognized the items. But that doesn’t make sense—why would Ember Jackals want that BIG piece of information? Unless … very very odd …

Assuming that you need 8 bits for each … hmmm …. item …. what is EJ really communicating?

Flag format: flag{XXXXXXXXXXX}

Free Hint: think of the absolute min number of bits.

Free (BIG) Hint:
image.png

  • View Hint
    An image is worth 1000 words (or less, sometimes)

  • View Hint
    Only four colours (RGB+Y) .. that is very old-school

  • View Hint
    You can send bits via pulses, waves …. or colours?

Key Points:


Kiddy Tags - 2

Desc

Kiddy 1 is tough, but your team believes in you, and you are now receiving more artifacts to analyze. This time, it’s a PCAP from a corporate workstation—pretty standard. However, something feels off. It’s time to take a closer look.

Can you find the configuration file?

Flag format: flag{XXXXXXXXXXXX}

▼ View Hint
Protocol statistics are pretty useful to understand PCAPs: You can easily spot bytes!

▼ View Hint
I wonder if you can extract the components of the slide. I mean, the real components … the original ones.

Key Points:


Kiddy Tags - 3

Desc

Wow, you are making good progress. Your boss decides that you would be the lead investigator for the next issues. And just in time, you received another PCAP with more data to analyze. Seems like our alloys research was getting some unwanted attention. Have fun!

Can you find the message hidden in the data?!

Flag Format: flag[XXXXXXXXXXX]

▼ Unlock Hint for 0 points

Everytime I heard research I think of DNS, I mean, DNA.

▼ Unlock Hint for 0 points

Research, R&D … I am pretty sure I saw something linked to R&D somewhere.

Key Points:


Forensics Analysis

δραπετεύω

Desc

Note: Use the attached artifacts for the following four challenges.

We found our HMI for the heating system with an open browser Window, making a lot of noise. Someone or something has opened this. http://nyan.cat does not seem to be malicious itself, our research at http://http.cat also shows nothing weird. We successfully captured a triage collection from the system.

Can you investigate what might be off with this browser? Can we identify if someone left a “calling card”?

Flag format: flag{text}

▼ View Hint
What artifacts would a browser produce? We don’t have the full pcap.

▼ View Hint
Have you looked at the screenshot?

▼ View Hint
Does anything stick out? Maybe it needs some rotating.

Key Points: