Benjamin Taylor

Holmes CTF: “The Watchman’s Residue” 👮

👤 Author: Benjamin Taylor (@benjqminn)

🤝 Team: Sherlock’s Homies

🏆 Ranking: 634 / 7,085 teams

📝 Prompt: Holmes receives a breadcrumb from Dr. Nicole Vale - fragments from a string of cyber incidents across Cogwork-1. Each lead ends the same way: a digital calling card signed JM.

📌 Summary: Multi-stage web attack against Nicole Vale’s honeypot attributed to actor “JM”: initial reconnaissance (distinct User-Agent), WAF bypass with web shell deployment, database exfiltration, malware persistence, and infrastructure mapping via Cogwork platforms.

🟨 Challenge Difficulty: MEDIUM


📋 TL;DR (Answers)


🚩 Flag 1:

Question: What was the IP address of the decommissioned machine used by the attacker to start a chat session with MSP-HELPDESK-AI? (IPv4 address)

Walkthrough:

Wireshark Helpdesk

Wireshark Helpdesk2

Answer: 10.0.69.45


🚩 Flag 2:

Question: What was the hostname of the decommissioned machine? (string)

Walkthrough:

nbns query

WATSON-ALPHA-2

Answer: WATSON-ALPHA-2


🚩 Flag 3:

Question: What was the first message the attacker sent to the AI chatbot? (string)

Walkthrough:

Sort by IP Source

Member: content pair

Answer: Hello Old Friend


🚩 Flag 4:

Question: When did the attacker’s prompt injection attack make MSP-HELPDESK-AI leak remote management tool info? (YYYY-MM-DD HH:MM:SS)

Walkthrough:

Attacker Communication

TCP Stream

AI Information Leak

AI Information Leak

Answer: 2025-08-19 12:02:06


🚩 Flag 5:

Question: What is the Remote management tool Device ID and password? (IDwithoutspace:Password)

Walkthrough:

AI ID and Password Leak

Answer: 565963039:CogWork_Central_97&65


🚩 Flag 6:

Question: What was the last message the attacker sent to MSP-HELPDESK-AI? (string)

Walkthrough:

Filter by IP

Attacker Message

Answer: JM WILL BE BACK


🚩 Flag 7:

Question: When did the attacker remotely access Cogwork Central Workstation? (YYYY-MM-DD HH:MM:SS)

Walkthrough:

IPv4 Narrowing

IPv4 Filter

SYN from Attacker

Narrow Time Down

Incoming Connections

Answer: 2025-08-20 09:58:25


🚩 Flag 8:

Question: What was the RMM Account name used by the attacker? (string)

Walkthrough:

RMM Account Name

Answer: James Moriarty


🚩 Flag 9:

Question: What was the machine’s internal IP address from which the attacker connected? (IPv4 address)

Walkthrough:

Search for IP

IP found

Answer: 192.168.69.213


🚩 Flag 10:

Question: The attacker brought some tools to the compromised workstation to achieve its objectives. Under which path were these tools staged? (C:\FOLDER\PATH)

Walkthrough:

Attacker Actions

Temp\safe folder

Answer: C:\Windows\Temp\safe\


🚩 Flag 11:

Question: Among the tools that the attacker staged was a browser credential harvesting tool. Find out how long it ran before it was closed? (Answer in milliseconds) (number)

Walkthrough:

Folder contents

Focus time

Answer: 8000


🚩 Flag 12:

Question: The attacker executed a OS Credential dumping tool on the system. When was the tool executed? (YYYY-MM-DD HH:MM:SS)

Walkthrough:

$J file parsed

MIMIKATZ install

MIMIKATZ instance

Answer: 2025-08-20 10:07:08


🚩 Flag 13:

Question: The attacker exfiltrated multiple sensitive files. When did the exfiltration start? (YYYY-MM-DD HH:MM:SS)

Walkthrough:

Windows\Temp folder

Start of exfiltration

Answer: 2025-08-20 10:12:07


🚩 Flag 14:

Question: Before exfiltration, several files were moved to the staged folder. When was the Heisen-9 facility backup database moved to the staged folder for exfiltration? (YYYY-MM-DD HH:MM:SS)

Walkthrough:

Heisen-9 database moved

Answer: 2025-08-20 10:11:09


🚩 Flag 15:

Question: When did the attacker access and read a txt file, which was probably the output of one of the tools they brought, due to the naming convention of the file? (YYYY-MM-DD HH:MM:SS)

Walkthrough:

Text File Moved

dump.txt accessed

Answer: He's a ghost I carry, not to haunt me, but to hold me together - NULLINC REVENGE


🚩 Flag 16:

Question: The attacker created a persistence mechanism on the workstation. When was the persistence setup? (YYYY-MM-DD HH:MM:SS)

Walkthrough:

winlogon

JM.exe path

Answer: 2025-08-20 10:13:57


🚩 Flag 17: Cryptic Banner

Question: What is the MITRE ID of the persistence subtechnique? (Txxxx.xxx)

Walkthrough:

Google query MITRE result Persistence Subtechnique ID

Answer: T1547.004


🚩 Flag 18: Cryptic Banner

Question: When did the malicious RMM session end? (YYYY-MM-DD HH:MM:SS)

Walkthrough:

Heisen-9 database moved

Answer: 2025-08–20 10:14:27


🚩 Flag 19: Cryptic Banner

Question: The attacker found a password from exfiltrated files, allowing him to move laterally further into CogWork-1 infrastructure. What are the credentials for Heisen-9-WS-6? (user:password)

Walkthrough:

Master password required

Hashcat format

Hashcat start

Cracked hash

Password Typed Access granted

Username and password

Answer: Werni:Quantum1!


Next challenge writeup: Holmes — The Enduring Echo 🔊