当前位置:网站首页>Zhongke panyun-2022 Guangdong Trojan horse information acquisition and analysis
Zhongke panyun-2022 Guangdong Trojan horse information acquisition and analysis
2022-07-04 04:59:00 【Beluga】
Trojan information acquisition
Need data package to be private
1. From the target server FTP Upload and download wire0077.pcap, Analyze the file , Find out the protocol used by hackers , Submit agreement name .
At the beginning, this question is about what agreement there is , But I didn't see much , When you do the second question, you know it is SMTP, This is also a problem-solving skill , When there is a relationship between the present and the future, it can be appropriately deduced from the back

2. Analyze the file , Find out what hackers got zip Compress package file , Submit the file name of the compressed package .
Because the answer of the first question is not determined , Nor can it be done directly through the application layer protocol , But you can use the transport layer , After all, the transport layer is UDP and TCP And they are basically used TCP
Filter out tcp The package contains keywords zip My bag , This is also a helpless move. After all, the first question can't be done

track TCP Stream finds suspicious target , The answer is correct after submission

3. Analyze the file , Find out the sensitive files obtained by hackers , The file name of the submitted sensitive file .
I learned that the agreement is SMTP, Look first , After reading for some time, I found a suspicious target agreement imf, This will filter out all the files

Then try to submit , But what's worse here is that the names of two image files are almost the same , Pay attention to
4. Analyze the file , Find out the sensitive files obtained by hackers , The time when the sensitive document was submitted for disclosure .
This bag that directly finds the last question , The head is time

5. Analyze the file , Find out the sensitive files obtained by hackers , Submit the folder name leaked in the sensitive file .
There is a little hole in this question , The title is the name of the folder leaked in the sensitive file , The sensitive file is actually a picture , After restoration, the answer is ready
Because we need to solve the problem of line feed and coding , So I write a simple program to solve

The folder name in the figure is the answer

边栏推荐
- 简单g++和gdb调试
- Kivy tutorial 07 component and attribute binding implementation button button click to modify the label component (tutorial includes source code)
- Notes on the paper "cross view transformers for real time map view semantic segmentation"
- Capturing and sorting out external Fiddler -- Conversation bar and filter
- Formatted text of Kivy tutorial (tutorial includes source code)
- LeetCode136+128+152+148
- Definition of DCDC power supply current
- How do good test / development programmers practice? Where to go
- 附件六:防守工作簡報.docx
- 附件三:防守方评分标准.docx
猜你喜欢

海力士EMMC5.0及5.1系列对比详解

Yolov6 practice: teach you to use yolov6 for object detection (with data set)

每日刷题记录 (十二)

Sécurité du réseau dans les écoles professionnelles secondaires - preuve de mémoire

6-4漏洞利用-SSH Banner信息获取

中职组网络安全—内存取证

GUI application: socket network chat room

Notes on the paper "cross view transformers for real time map view semantic segmentation"

Create ASM disk through DD

定制一个自己项目里需要的分页器
随机推荐
【MATLAB】通信信号调制通用函数 — 傅里叶变换
【MATLAB】MATLAB 仿真模拟调制系统 — DSB 系统
Change the background color of Kivy tutorial (tutorial includes source code)
【MATLAB】MATLAB 仿真数字带通传输系统 — ASK、 PSK、 FSK 系统
测试 CS4344 立体声DA转换器
NTFS security permissions
Zhengzhou zhengqingyuan Culture Communication Co., Ltd.: seven marketing skills for small enterprises
Using jsts in esmodule environment
STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管
PaddleHub人脸识别方案部署,将训练好的模型在pytchrom中进行部署应用
软件设计文档示例模板 - 学习/实践
附件五:攻击过程简报.docx
中职组网络安全—内存取证
Error response from daemon: You cannot remove a running container 8d6f0d2850250627cd6c2acb2497002fc3
Share some of my telecommuting experience
Test cs4344 stereo DA converter
Cmake compilation option setting in ros2
抓包整理外篇fiddler———— 会话栏与过滤器
技术管理 - 学习/实践
红队视角下的防御体系突破之第二篇案例分析