Ghost Process9_B

Memory Forensic 100 pts standard
Challenge Description

Q9 — C2 Communication Port

The malware connects back to its C2 server on a specific port, chosen to blend in with common web traffic and bypass simple firewall rules.

What port does the malware use for C2 communication?

Flag format : HackCTF{PORT_NUMBER}

Congratulations! Room 3 — Ghost Process completed. The ghost has been exorcised. Proceed to the next room.

Submit Flag

Login to submit a flag.

← All Challenges