HackTheBox Pursue the Tracks Writeup
Explore the basics of cybersecurity in the Pursue the Tracks Challenge on Hack The Box. This easy-level Challenge introduces encryption reversal and file handling concepts in a clear and accessible way, perfect for beginners.
1
mft2csv z.mft
Set the output path and analyze the resulting CSV file.
Files are related to two years, which are those? (for example: 1993,1995)
2023,2024
There are some documents, which is the name of the first file written? (for example: randomname.pdf)
Final_Annual_Report.xlsx
Which file was deleted? (for example: randomname.pdf)
Marketing_Plan.xlsx
How many of them have been set in Hidden mode? (for example: 43)
1
Which is the filename of the important TXT file that was created? (for example: randomname.txt)
credentials.txt
A file was also copied, which is the new filename? (for example: randomname.pdf)
Financial_Statement_draft.xlsx
Which file was modified after creation? (for example: randomname.pdf)
Project_Proposal.pdf
What is the name of the file located at record number 45? (for example: randomname.pdf)
Annual_Report.xlsx
What is the size of the file located at record number 40? (for example: 1337)
57344
This post is licensed under CC BY 4.0 by the author.