So as usual I was working on a Monday Morning and I received an email from my company with a different domain which didn’t sounded suspicious as an organization does have multiple domains nor was there any keywords in email such as Urgent or Login or change your password so I let it go at that time.
So I continued working but later my curiosity started bothering me to try something so I started reconnaissance on this domain starting with whois information for the domain but nothing there, the domain obviously has privacy protection enabled.
Later when I checked the…
In June 2020 BSides TLV hosted a Capture the Flag Event which comprised of various Challenges segregated with multiple categories such as Reverse Engineering, Web, Cryptography, etc.
The Target was a Miscellaneous challenge which consisted Reverse Engineering of the file.
After Downloading it we would run File Command against TheTarget to know its file type:
root@rootsploit# file TheTarget
TheTarget: Extensible storage engine DataBase, version 0x620, checksum 0x54fcc144, page size 8192, Windows version 6.3
Extensible Storage Engine (ESE) is an advanced indexed and sequential access method (ISAM) storage technology. ESE enables applications to store and retrieve data from tables using indexed or sequential cursor navigation. …