当前位置:网站首页>Zhongke panyun-2022 Guangdong Trojan horse information acquisition and analysis
Zhongke panyun-2022 Guangdong Trojan horse information acquisition and analysis
2022-07-04 04:59:00 【Beluga】
Trojan information acquisition
Need data package to be private
1. From the target server FTP Upload and download wire0077.pcap, Analyze the file , Find out the protocol used by hackers , Submit agreement name .
At the beginning, this question is about what agreement there is , But I didn't see much , When you do the second question, you know it is SMTP, This is also a problem-solving skill , When there is a relationship between the present and the future, it can be appropriately deduced from the back
2. Analyze the file , Find out what hackers got zip Compress package file , Submit the file name of the compressed package .
Because the answer of the first question is not determined , Nor can it be done directly through the application layer protocol , But you can use the transport layer , After all, the transport layer is UDP and TCP And they are basically used TCP
Filter out tcp The package contains keywords zip My bag , This is also a helpless move. After all, the first question can't be done
track TCP Stream finds suspicious target , The answer is correct after submission
3. Analyze the file , Find out the sensitive files obtained by hackers , The file name of the submitted sensitive file .
I learned that the agreement is SMTP, Look first , After reading for some time, I found a suspicious target agreement imf, This will filter out all the files
Then try to submit , But what's worse here is that the names of two image files are almost the same , Pay attention to
4. Analyze the file , Find out the sensitive files obtained by hackers , The time when the sensitive document was submitted for disclosure .
This bag that directly finds the last question , The head is time
5. Analyze the file , Find out the sensitive files obtained by hackers , Submit the folder name leaked in the sensitive file .
There is a little hole in this question , The title is the name of the folder leaked in the sensitive file , The sensitive file is actually a picture , After restoration, the answer is ready
Because we need to solve the problem of line feed and coding , So I write a simple program to solve
The folder name in the figure is the answer
边栏推荐
- Annexe VI: exposé sur les travaux de défense. Docx
- 练习-冒泡排序
- MySQL indexes and transactions
- Correct the classpath of your application so that it contains a single, compatible version of com. go
- Yolov6 practice: teach you to use yolov6 for object detection (with data set)
- 中科磐云—数据分析与取证数据包flag
- 加密和解密
- Annex I: power of attorney for 202x XXX attack and defense drill
- 【MATLAB】MATLAB 仿真模拟调制系统 — AM 已调信号的功率谱与相干解调
- 网络设备应急响应指南
猜你喜欢
6-5漏洞利用-SSH弱口令破解利用
Annex VI: defense work briefing docx
YoloV6实战:手把手教你使用Yolov6进行物体检测(附数据集)
Deep understanding of redis -- bloomfilter
拼夕夕二面:说说布隆过滤器与布谷鸟过滤器?应用场景?我懵了。。
Developing mqtt access program under QT
附件六:防守工作簡報.docx
Change the background color of Kivy tutorial (tutorial includes source code)
Utiliser des unités de mesure dans votre code pour une vie meilleure
Use units of measure in your code for a better life
随机推荐
【MATLAB】MATLAB 仿真数字基带传输系统 — 数字基带传输系统
How to build your own knowledge engine? Community open application
[wechat applet] good looking carousel map component
RAC delete damaged disk group
MAUI 入门教程系列(5.XAML及页面介绍)
【MATLAB】通信信号调制通用函数 — 傅里叶变换
cmake
网络设备应急响应指南
【MATLAB】通信信号调制通用函数 — 窄带高斯白噪声的生成
加密和解密
Flutter 调用高德地图APP实现位置搜索、路线规划、逆地理编码
【MATLAB】MATLAB 仿真 — 窄带高斯白噪声
【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(第 I 类部分响应波形)的眼图
The second case analysis of the breakthrough of defense system from the perspective of the red team
我们认为消费互联网发展到最后,依然会局限于互联网行业本身
When using flash to store parameters, the code area of flash is erased, which leads to the interrupt of entering hardware error
Flutter ‘/usr/lib/libswiftCore.dylib‘ (no such file)
Yolov6 practice: teach you to use yolov6 for object detection (with data set)
全国职业院校技能大赛(中职组)网络安全竞赛试题—解析
6-4漏洞利用-SSH Banner信息获取