Ghost Process9_B
Memory Forensic
100 pts
standard
Challenge Description
Q9 — C2 Communication Port
The malware connects back to its C2 server on a specific port, chosen to blend in with common web traffic and bypass simple firewall rules.
What port does the malware use for C2 communication?
Flag format : HackCTF{PORT_NUMBER}
Congratulations! Room 3 — Ghost Process completed. The ghost has been exorcised. Proceed to the next room.
Submit Flag
Login to submit a flag.