lesion.io Blog
CtrlK
  • Roadmap
  • Docs
    • Templates
      • Data Inventory
      • Access Control
      • Cybersecurity Roles & Responsibilities
      • Asset Inventory
      • Acceptable Use Policy
      • Change Management
      • Vendor Risk Assessment Form
      • Password Protection Policy
  • Articles
    • 2025
      • Why Every Business Needs a Solid Business Continuity Plan — And How to Start One (2 minute read)
      • Vulnerability Scanning - What is it and why does it matter? (2 minute read)
      • Social Engineering - How attackers take advantage of the weakest link
  • About Us
    • Manifesto
    • Metrics
  • CTF Team
    • CISA ICS CTF 2024
      • Virbank
        • Mission: Inconceivable - 1
        • Mission: Inconceivable - 2
        • Extend Your Stay - 1
        • Extend Your Stay - 2
        • Extend Your Stay - 3
        • Extend Your Stay - 4
        • Follow The Charts - 1
        • Follow The Charts - 2
        • Read Askew Manuscripts - 1
        • Read Askew Manuscripts - 2
        • Read Askew Manuscripts - 3
        • Read Askew Manuscripts - 4
        • Read Askew Manuscripts - 5
      • Anville
        • Genisys of the Problems - 1
        • Genisys of the Problems - 2
        • Genisys of the Problems - 3
        • Modeling Trains - 1
        • Modeling Trains - 2
        • Modeling Trains - 3
      • Castelia
        • Page
      • Driftviel
        • Page 1
Powered by GitBook
On this page

Was this helpful?

  1. CTF Team
  2. CISA ICS CTF 2024
  3. Virbank

Follow The Charts - 1

  1. We are tasked with downloading the potential malware sample and identifying the MD5 hash.

  2. Once we download the file from Malcolm we use the command md5sum on the file to get the files hash.

PreviousExtend Your Stay - 4NextFollow The Charts - 2

Last updated 11 months ago

Was this helpful?