midnight7_B

Log Analysis 100 pts standard
Challenge Description

Q7 — Installed Service Post-Compromise

**Shortly after gaining access, the attacker installed a service to maintain persistence on the victim machine. ** What service was installed post-compromise?

Flag format : HackCTF{SERVICE_NAME}

★ Correct answer unlocks Q8 — Attacker's Workstation Name.

Submit Flag

Login to submit a flag.

← All Challenges