[Day 23] Defence in Depth Out of all yetis you know you’re the mastermind

Rahul Setrakian
3 min readDec 24, 2022

--

Greetings netizen. Today, we are here to solve the day “[Day 23] Defence in Depth Out of all yetis you know you’re the mastermind.”

In today’s task, let’s go over how adversary mind works. A cyber adversary is a person or group that seeks to gain unauthorized access to computer systems or networks for malicious purposes. These adversaries may have a variety of motivations, such as financial gain, espionage, or disruption of service.

To achieve their goals, cyber adversaries often use a variety of tactics and techniques. Some common methods used by cyber adversaries include:

  1. Scanning: This involves using automated tools to search for vulnerabilities in computer systems or networks.
  2. Exploitation: Once a vulnerability has been identified, the adversary may attempt to exploit it in order to gain access to the system or network.
  3. Persistence: Once the adversary has gained access to a system, they may try to maintain that access over a long period of time in order to continue to gather information or carry out malicious activities.
  4. Exfiltration: The adversary may try to steal sensitive data from the system or network, such as intellectual property or personal information.
  5. Covering their tracks: In order to avoid detection, the adversary may try to cover their tracks by deleting or altering logs or other evidence of their activities.

Cyber adversaries are constantly evolving and adapting their tactics and techniques, so it is important for organizations and individuals to stay vigilant and implement best practices for cybersecurity.

Question & Answers:

  1. Case 1: What is the password for Santa’s Vault?
    Answer: You can find the answers in our telegram community.
  2. Case 1: What is the Flag?
    Answer: You can find the answers in our telegram community.
  3. Case 2: What is Santa’s favourite thing?
    Answer: You can find the answers in our telegram community.
  4. Case 2: What is the password for Santa’s Vault?
    Answer: You can find the answers in our telegram community.
  5. Case 2: What is the Flag?
    Answer: You can find the answers in our telegram community.
  6. Case 3: What is the Executive Assistant’s favourite thing?
    Answer: You can find the answers in our telegram community.
  7. Case 3: What is Santa’s previous password?
    Answer: You can find the answers in our telegram community.
  8. Case 3: What is Santa’s current password?
    Answer: You can find the answers in our telegram community.
  9. Case 3: What is the 1st part of the vault’s password?
    Answer: You can find the answers in our telegram community.
  10. Case 3: What is the 2nd part of the vault’s password?
    Answer: You can find the answers in our telegram community.
  11. Case 3: What is the password for Santa’s Vault?
    Answer: You can find the answers in our telegram community.
  12. Case 3: What is the Flag?
    Answer: You can find the answers in our telegram community.
  13. What is Santa’s Code?
    Answer: You can find the answers in our telegram community.
  14. Mission ELFPossible: What is the Abominable for a Day Flag?
    Answer: You can find the answers in our telegram community.

Join the Community: https://telegram.me/NonymousCommunity

References:

https://tryhackme.com/room/adventofcyber4

--

--

Rahul Setrakian

I am Rahul Setrakian, a self-taught programmer looking to get into cybersecurity. I am passionate about programming and hacking.