当前位置:网站首页>Wireshark data analysis and forensics a.pacapng
Wireshark data analysis and forensics a.pacapng
2022-07-03 01:27:00 【Lonely fish】
Wireshark( Pre name Ethereal) Is a network packet analysis software . The function of network packet analysis software is to retrieve network packets , At the same time, the most detailed network packet data is displayed .Wireshark Use WinPCAP As an interface , Data message exchange with network card directly .
Suppose you are a network security engineer , Need to analyze the data of a company , Analyze the operations performed by hackers to obtain computer permissions , In this chapter, we mainly analyze the key data by analyzing the case data package .
A.pacapng Data packets
1. Through analysis windows 7 Packets on the desktop A.pcapng, Find the password for the hacker to connect the Trojan horse in one sentence , Use this password as FLAG Submit ;
Screening
httpagreementctrl+FSearch for keyword@eval

2. Through analysis windows 7 Packets on the desktop A.pcapng, View call upload one sentence Trojan file ;
aaaa.php
3. By analyzing the data package A.pcapng, Find the range of network segments scanned by hackers (IP In between ”,” separate , example :192.168.1.1-192.168.1.2) Use this range as FLAG Submit ;
Screening
arpagreement spotInfoSort out Here we are31But it was swept30Start connecting the Trojan horse To be specific, try again during the competition .


192.168.10.10-192.168.10.30
4. By analyzing the data package A.pcapng, What is the password to find the domain server , Use this password as FLAG Submit ;
163.com
5. By analyzing the data package A.pcapng, Find the file uploaded by the hacker and use the name as FLAG Submit ;
6. By analyzing the data package A.pcapng, Find out what the hacker downloaded , Treat the contents of this file as FLAG Submit ;
Put the packet into
kailiUsebinwalk -eTo separate



Use crunch Make a dictionary and insert it into the current directory passwd1.txt Next Use fcrackzip Blast zip The password for encrypting the file is DBOQ6457


flag{friday}
If you don't know the place, you can confide in the blogger , Welcome to exchange !! Communication group :603813289( Just built )
Finally, if it helps you I hope you can support the blogger for the third company , Your support is my greatest motivation , Reprint please indicate the original link support original thank you !
边栏推荐
- The industrial scope of industrial Internet is large enough. The era of consumer Internet is only a limited existence in the Internet industry
- Find a benchmark comrade in arms | a million level real-time data platform, which can be used for free for life
- 【C语言】指针与数组笔试题详解
- 按键精灵打怪学习-自动回城路线的判断
- Matlab finds the position of a row or column in the matrix
- Leetcode 2097 - Legal rearrangement of pairs
- What are the trading forms of spot gold and what are the profitable advantages?
- 关于Fibonacci数列
- C#应用程序界面开发基础——窗体控制(2)——MDI窗体
- MySQL
猜你喜欢

How is the mask effect achieved in the LPL ban/pick selection stage?
![[C language] detailed explanation of pointer and array written test questions](/img/24/c2c372b5c435cbd6eb83ac34b68034.png)
[C language] detailed explanation of pointer and array written test questions

Give you an array numbers that may have duplicate element values. It was originally an array arranged in ascending order, and it was rotated once according to the above situation. Please return the sm
![[Androd] Gradle 使用技巧之模块依赖替换](/img/5f/968db696932f155a8c4a45f67135ac.png)
[Androd] Gradle 使用技巧之模块依赖替换
![leetcode:701. Insertion in binary search tree [BST insertion]](/img/bc/1dda73198488eb81b49be2c1dff6c2.png)
leetcode:701. Insertion in binary search tree [BST insertion]

Find a benchmark comrade in arms | a million level real-time data platform, which can be used for free for life

Draw love with go+ to express love to her beloved

Basis of information entropy

wirehark数据分析与取证A.pacapng

MySQL
随机推荐
R language generalized linear model function GLM, (model fit and expression diagnostics), model adequacy evaluation method, use plot function and car package function
[Cao gongzatan] after working in goose factory for a year in 2021, some of my insights
Using tensorboard to visualize the model, data and training process
按键精灵打怪学习-回城买药加血
How wide does the dual inline for bread board need?
Excel if formula determines whether the two columns are the same
Niu Ke swipes questions and clocks in
Machine learning terminology
C#应用程序界面开发基础——窗体控制(4)——选择类控件
强化学习 Q-learning 实例详解
Why can't the start method be called repeatedly? But the run method can?
MySQL --- 数据库查询 - 基本查询
ThinkPHP+Redis实现简单抽奖
Strongly connected components of digraph
The latest analysis of tool fitter (technician) in 2022 and the test questions and analysis of tool fitter (technician)
C#应用程序界面开发基础——窗体控制(1)——Form窗体
The difference between tail -f, tail -f and tail
R language uses coin package to apply permutation tests to independence problems (permutation tests, whether response variables are independent of groups, are two numerical variables independent, and
按键精灵打怪学习-多线程后台坐标识别
音程的知识的总结