# Prep Track

Get ready for the Advent of Cyber 2025 with the "Advent of Cyber Prep Track", a series of warm-up tasks aimed to get beginners ready for this year's event.

# Password Pandemonium

### Overview
---
**Room URL:** [https://tryhackme.com/room/adventofcyberpreptrack](https://tryhackme.com/room/adventofcyberpreptrack)  
**Difficulty:** Easy  
**Category:**  Prep  
**Date Completed:**  12/1/2025  

### Objective
Create a password that passes all system checks and isn’t found in the leaked password list.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Resources](#bkmrk-resources)  

---
### Introduction
You've just logged into your TBFC workstation when an alert reveals weak passwords across 73 accounts—including McSkidy's P@ssw0rd123. To gain full access, you must demonstrate strong password practices, which remain one of the simplest yet most effective defenses against cyber attacks.

#### Password Requirements
- Enter a password with at least 12 characters.
- Include uppercase, lowercase, numbers, and symbols.
- Ensure it isn’t in the breach database.


---
### Walk Through
1. Entered the TBFC website
2. Clicked to update password
3. Choose a secure password
    1. Pandemonium4u!
    2. A phrase substituting the words for number and adding symbols
[![PasswordPandemonium.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/passwordpandemonium.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/passwordpandemonium.png)

---
### Resources
[TryHackMe](tryhackme.com)  
[Okta](https://www.okta.com/identity-101/password-vs-passphrase/)

# The Suspicious Chocolate.exe

### Overview
---
**Room URL:** [https://tryhackme.com/room/adventofcyberpreptrack](https://tryhackme.com/room/adventofcyberpreptrack)  
**Difficulty:** Easy  
**Category:**  Prep  
**Date Completed:**  12/1/2025  

### Objectives
Determine if `chocolate.exe` is safe or infected.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)  

---
### Introduction
A suspicious USB labeled "SOCMAS Party Playlist" containing `chocolate.exe` arrives on your desk. You must use a simulated VirusTotal tool to scan the file and determine if it's safe or malicious—a critical skill for identifying threats before they compromise systems.

---
### Walk Through
1. Click the view site button on THM
    1. This brings up a simulated virustotal website preloaded with `chocolate.exe`
2. Clicking scan to scan the `.exe` file on virtustotal
3. After clicking scan, the website scans the file and loads the results
    1. The website loaded results from 48 vendors
        1. Clean Vendor A
        2. Clean Vendor B
        3. Malhare Labs
        4. +45 other vendors marked this file as clean
    2. Malhare labs is classified as `MalhareTorjan` with `ref:ML-2025-011
4. This file is not free from viruses. 
[![suspiciouschocolate.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/suspiciouschocolate.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/suspiciouschocolate.png)

---
### Lessons Learned
In this activity, I learned how to use VirusTotal to scan files for viruses and identify malicious threats across multiple security vendors.

---
### Resources
[TryHackMe](tryhackme.com)  
[Virus Total](https://www.virustotal.com/gui/home/upload)

# Welcome to the AttackBox!

### Overview
---
**Room URL:** https://tryhackme.com/room/adventofcyberpreptrack  
**Difficulty:** Easy  
**Category:** Prep  
**Date Completed:** 12/1/2025 

### Objective
Find and read the hidden welcome message inside your AttackBox.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)  

---
### Introduction
You enter TBFC's AttackBox, a secure virtual training environment designed for hands-on cybersecurity practice. Mastering the command line in this safe sandbox is your first step toward becoming a skilled defender.

---
### Walk Through
1. Click the view site button to load the virtual attack environment
2. Use `ls` to view files
3. Use `cd` to move to the challenges directory
    1. `cd challenges`
4. Use `ls` to view files in the challenges directory
5. Use `cat` to view the contentents of `welcome.txt`
    1. `cat welcome.txt`
[![WelcometoAttackbox.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/welcometoattackbox.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/welcometoattackbox.png)

---
### Lessons Learned
- Learned basic Linux commands: ls (list files), cd (change directory), and cat (view file contents)
- Successfully navigated the AttackBox virtual environment to locate and read the welcome message
---
### Resources
[TryHackMe](tryhackme.com)

# The CMD Conundrum

### Overview
---
**Room URL:** https://tryhackme.com/room/adventofcyberpreptrack  
**Difficulty:** Easy  
**Category:** Prep  
**Date Completed:** 12/1/2025 

### Objectives
Find the hidden flag file using Windows commands.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)  

---
### Introduction
McSkidy's workstation shows signs of tampering—suspicious files have been moved, logs wiped, and a mysterious folder named `mystery_data` discovered. Using the Windows Command Prompt, you must investigate the system and uncover hidden evidence that the graphical interface cannot reveal.

#### Useful Commands
`dir` equivalent to the `ls` command on linux  
`dir /a` equivalent to the `ls -a` command on linux  
`type` equivalent to the `cat` command on linux  

---
### Walk Through
1. Click view site to open the emulated windows terminal
2. use `dir` to view files and directories
    1. `dir` showed 1 file and 1 directory
          1. `readme.txt`
          2. `mystery_data`
              1. This is directory
    2. `type readme.txt`
        1. "System shows signs of tampering. Investigate the mystery_data folder"
    3. `cd mystery_data` to change directories
    4. `dir` shows `notes.txt
        1. `type notes.txt`
        2. "Some logs were wiped. Hidden artifacts may still remain..."
    5. `dir /a` to show all files including hidden ones
    6. found `hidden_flag.txt`
        1. `type hidden_flag.txt` to reveal contents      
[![cmdconundrum.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/cmdconundrum.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/cmdconundrum.png)

---
### Lessons Learned
- Learned Windows Command Prompt equivalents: `dir` (list files), `dir /a` (show hidden files), and `type` (view file contents)
- Successfully investigated McSkidy's compromised workstation by navigating directories and uncovering hidden artifacts that revealed tampering evidence
---
### Resources
[TryHackMe](tryhackme.com)  
[List of Windows Commands](https://www.lifewire.com/list-of-command-prompt-commands-4092302)

# Linux Lore

### Overview
---
**Room URL:** https://tryhackme.com/room/adventofcyberpreptrack  
**Difficulty:** Easy  
**Category:** Prep  
**Date Completed:** 12/1/2025  

### Objective
Locate McSkidy’s hidden message in his Linux home directory.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)


---
### Introduction
TBFC's delivery drones are malfunctioning and dropping eggs instead of presents. McSkidy's last login originated from a Linux server, and investigating his account may reveal the cause. Mastering Linux search capabilities is essential for defenders, as Linux powers most servers worldwide.

#### Useful Commands
`ls` list files in a directory  
`ls -l` list files in a directory, shown as a list  
`ls -a` list all files in a directory including hidden files  
`cat` display the contents of a file in the terminal  

---
### Walk Through
1. Click the view site button to open the emulated linux terminal
2. `cd /home/mcskiddy` to change directory to McSkiddy's home directory
3. `ls -la` to view all of McSkidy's files in a list
4. revealed 2 files
    1. `readme.txt`
        1. "Delivery drones are glitching. Check hidden files for clues.  
    3. .secret_message `
        1. Hidden messages, secret files -- McSkiddy sure knows his way around Linux.
        2. **FLAG** 
[![linuxlore.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/linuxlore.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/linuxlore.png)

---
### Lessons Learned
- Learned Linux file listing commands: `ls` (list files), `ls -l` (detailed list view), and `ls -a` (show hidden files)
- Successfully investigated McSkidy's home directory using `ls -la` to uncover hidden files and discover the flag in `.secret_message`
---
### Resources
[TryHackMe](tryhackme.com)  
[Linux Command Cheat Sheet](https://www.geeksforgeeks.org/linux-unix/linux-commands-cheat-sheet/)

# The Leak in the List

### Overview
---
**Room URL:** https://tryhackme.com/room/adventofcyberpreptrack  
**Difficulty:** Easy  
**Category:** Prep  
**Date Completed:** 12/1/2025

### Objective
Check if McSkidy’s email has appeared in a breach.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)  

---
### Introduction
Rumors circulate that TBFC's data has been leaked, causing emails to bounce and staff to panic. McSkidy suspects his account may have been compromised in the breach. Defenders use tools like **Have I Been Pwned** to identify compromised accounts early, preventing attacks from spreading further.  

---
### Walk Through
1. Click the view site button to launch the simulated *Have I Been Pwned* website
2. Enter McSkiddy's email `mcskidy@tbfc.com` to see if it has been compromised
3. The email has been found in a breach
    1. `hopsec.io` compromised on 2025-01-16
[![LeakList.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/leaklist.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/leaklist.png)


---
### Lessons Learned
- Learned how to use Have I Been Pwned to check if email addresses have been compromised in data breaches
- Successfully identified that McSkidy's email `mcskidy@tbfc.com` was compromised in the `hopsec.io` breach on 2025-01-16, demonstrating the importance of early breach detection
---
### Resources
[TryHackMe](tryhackme.com)  
[HaveIBeenPwned](https://haveibeenpwned.com/)

# WiFi Woes in Wareville

### Overview
---
**Room URL:** https://tryhackme.com/room/adventofcyberpreptrack  
**Difficulty:** Easy  
**Category:** Prep  
**Date Completed:** 12/1/2025

### Objectives
Log into the router and secure it with a strong new password.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)  

---
### Introduction
TBFC's delivery drones loop endlessly over Wareville Square after someone accessed the company router using default credentials. Securing WiFi with strong, non-default passwords is critical—default credentials are equivalent to leaving the front gate wide open to attackers.

#### Password Minimum Requirements
- Minimum 12 Characters
- Must include Upper, lower, number, and symbol
- Not in common leaked list

---
### Walk Through
1. Click view site to open the simulate router login page
2. The default credentials are `admin:admin`
3. Entered a new password for the portal administation based on best practices and minimum requirements
    1. Chose `boogeyman4U!`
[![WoesWareville.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/woeswareville.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/woeswareville.png)  

---
### Lessons Learned
- Learned critical WiFi security practices: default credentials must be changed immediately and replaced with strong passwords meeting minimum requirements (12+ characters, uppercase, lowercase, numbers, and symbols)
- Successfully secured the TBFC router by replacing the default `admin:admin` credentials with a strong password `boogeyman4U!`, demonstrating proper access control implementation
---
### Resources
[TryHackMe](tryhackme.com)  
[Password Best Practices](https://www.cisa.gov/secure-our-world/use-strong-passwords)

# The App Trap

### Overview
---
**Room URL:** https://tryhackme.com/room/adventofcyberpreptrack  
**Difficulty:** Easy  
**Category:** Prep  
**Date Completed:** 12/1/2025

### Objective
Find and remove the malicious connected app.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)  

---
### Introduction
McSkidy's social media account has been compromised and is posting suspicious messages about "EASTMAS." A malicious third-party application may be responsible for the unauthorized access. Learning to review and manage app permissions is essential for preventing data leaks and unauthorized account access.

---
### Walk Through
1. Click view site to launch the simulated enviroment
2. There are 3 applications in the enviroment with the following permissions
    1. Weather Elf
        1. `Location`
        2. `Network Access`
        3. `Notifications`
    2. Gift Tracker
        1. `Contacts`
        2. `Network Access`
        3. `Storage`
    3. Eastmas Scheduler
        1. `Calendar`
        2. `Notifications`
        3. `Passwordvault`
3. Weather Elf and Gift tracker have appropriate apps for their use case. Eastmas Schedular has no reason to have access to `Password Vault`
4. Revoked access to `password vault`
[![apptrap.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/apptrap.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/apptrap.png)

---
### Lessons Learned
- Learned to audit third-party application permissions and identify overprivileged apps that request unnecessary access to sensitive data
- Successfully identified that the **Eastmas Scheduler** app had suspicious access to the `Password Vault` and revoked it, demonstrating proper permission management to prevent unauthorized account compromise
---
### Resources
[TryHackMe](tryhackme.com)  
[App Permission](https://us.norton.com/blog/privacy/app-permissions-to-avoid)

# The Chatbot Confession

### Overview
---
**Room URL:** https://tryhackme.com/room/adventofcyberpreptrack  
**Difficulty:** Easy  
**Category:** Prep  
**Date Completed:** 12/1/2025  

### Objective
Identify which chatbot messages contain sensitive information.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)  

---
### Introduction
TBFC's AI assistant, **FestiveBot**, designed to help compose cheerful emails, has begun leaking sensitive information including internal URLs and passwords. While AI tools are powerful productivity aids, defenders must understand how to prevent them from inadvertently disclosing confidential data.

---
### Walk Through
1. Click view site to load the session with the chat bot
2. Several of the messages from the chat bot contain confidential information
    1. "Reminder: staging admin lives at `https://internal.tbfc.local/admin` for content approvals."
    2. "Email credentials as requested: user `festive.ops` and password `SnowGlobe#202`5."
    3. "Service token: `sk-live-1a2b3c4d5e6f7g8h` for the mail API. Use it sparingly." 
[![chatbotconfession.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/chatbotconfession.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/chatbotconfession.png)

---
### Lessons Learned
- Learned to identify AI-generated responses that inadvertently leak sensitive data such as internal URLs, credentials, and API tokens
- Recognized critical security risks: FestiveBot disclosed staging admin URLs `https://internal.tbfc.local/admin`, email credentials `festive.ops:SnowGlobe#2025`, and service tokens `sk-live-1a2b3c4d5e6f7g8h`, highlighting the importance of prompt engineering and output sanitization when using AI tools
---
### Resources
[TryHackMe](tryhackme.com)  
[AI ChatBot Security](https://layerxsecurity.com/learn/chatbot-security/)

# The Bunny’s Browser Trail

### Overview
---
**Room URL:** https://tryhackme.com/room/adventofcyberpreptrack  
**Difficulty:** Easy  
**Category:** Prep  
**Date Completed:** 12/1/2025  

### Objectives
Find the unusual User Agent in the HTTP log.

---
### Table of Contents
[Introduction](#bkmrk-introduction)  
[Walk Through](#bkmrk-walk-through)  
[Lessons Learned](#bkmrk-lessons-learned)  
[Resources](#bkmrk-resources)  

---
### Introduction
SOCMAS web servers are experiencing unusual traffic spikes, with one suspicious log entry revealing an unfamiliar User Agent: "BunnyOS/1.0 (HopSecBot)". Analyzing User Agent strings is critical for defenders to identify automated attacks and unauthorized visitors within network logs. 

#### Define User Agent
A client application used by an end user, typically for a network protocol such as HTTP or FTP. 

---
### Walk Through
1. Click view site to open the http web log entries
2. Several different user agents accessed this site
    1. `Chrome on Windows`
    2. `Safari on MacOS`
    3. `Firefox on Linux`
    4. `Edge on Windows`
    5. `BunnyOS (HopSecBot)`
    6. `Safari on IoS`
3. Based on this the abnormal agent is `BunnyOS` and they accessed `/admin/panel` according to the log.  
[![browsertrail.png](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/scaled-1680-/browsertrail.png)](https://bookstack.rizzoit.com/uploads/images/gallery/2025-12/browsertrail.png)

---
### Lessons Learned
- Learned to analyze HTTP web logs and identify User Agent strings to detect suspicious or automated traffic patterns
- Successfully identified `BunnyOS (HopSecBot)` as an anomalous User Agent among legitimate browsers, and discovered it accessed the sensitive `/admin/panel` endpoint, demonstrating how User Agent analysis reveals unauthorized system intrusions
---
### Resources
[TryHackMe](tryhackme.com)  
[Different User Agents](https://useragents.io/explore)