
404 pond not found
For this one, we need to perform a reverse image lookup on Google for this. Once we do that we can see that it leads to a Wikipedia page about duck ponds. From here we can see a location for the image, Queen Elizabeth Park.
Binary Lake
For this one we can just perform a whois lookup on this ip address 165.227.251.183. After doing that we can see this section:
OrgName: DigitalOcean, LLC
OrgId: DO-13
Address: 101 Ave of the Americas
Address: FL2
City: New York
StateProv: NY
PostalCode: 10013
Country: US
RegDate: 2012-05-14
Updated: 2023-10-23
Ref: https://rdap.arin.net/registry/entity/DO-13
Seeing this we can use the orgname as our solution: DigitalOcean.
The wiggle duckling 1 and 2
For this challenge, you need to go to wigle.net and submit the value AC:DB:48:48:84:47 as the BSSID.
From here we can see that the network is found in Boston Public Garden. We can submit that as our solution for the first one. For the second one, we need to just google statues in the garden and we can see there is one in there called Make Way for Ducklings. We can submit that for the second challenge.
ATT&CK!!! 1 and 2
For this one we can use the mitre attack matrix to find the solution. For 1 it mentions Splashtop. Splashtop is Remote access software so we will go with T1219 as our solution. For 2 we can look up the malware on the MITRE website and see what it is. The question asks how the malware is triggered. It is using traffic signaling which has the ID T1205.
oh Duck!
For this one, we can see the plane identifier on the side. We can just google that and pick a website to see flight history. In there, we can see that the plane had been grounded. So if we look into it more we can see a Wikipedia page labeled Alaska Airlines Flight 1282. On this, it details that the door flew off and that it landed back at the PDX airport. We can use Portland International Airport as our answer.