midnight7_B
Log Analysis
100 pts
standard
Challenge Description
Q7 — Installed Service Post-Compromise
**Shortly after gaining access, the attacker installed a service to maintain persistence on the victim machine. ** What service was installed post-compromise?
Flag format : HackCTF{SERVICE_NAME}
★ Correct answer unlocks Q8 — Attacker's Workstation Name.
Submit Flag
Login to submit a flag.