当前位置:网站首页>Zhongke Panyun - data analysis and forensics packet flag
Zhongke Panyun - data analysis and forensics packet flag
2022-07-04 04:59:00 【Beluga】
Data analysis and forensics
Need to be private
1. Use Wireshark View and analyze virtual machines windows 7 Under the desktop attack.pcapng Package file , through Analyzed packets attack.pcapng Find the hacker's IP Address , And put the hacker's IP Address as FLAG( form :[IP Address ]) Submit :
tcp.connection.syn
By analyzing the port , Because hackers scan common ports
Flag:[172.16.1.102]
2. Continue to view the package file attack.pacapng, Analyze which ports the hacker scanned , And make all ports by FLAG( form :[ Port name 1, Port name 2, Port name 3…, Port name n]) From low to high :
tcp.connection.syn and ip.src==172.16.1.102
Flag:[21,23,80,445,3389,5007]
3. Continue to view the package file attack.pacapng Analyze what the hacker finally gets the user name , And users Name as FLAG( form :[ user name ]) Submit :
http.request.method==POST
Flag:[Lancelot]
4. Continue to view the package file attack.pacapng Analyze what the hacker finally got the password , And make the password by FLAG( form :[ password ]) Submit :
http.request.method==POST
flag:[12369874]
5. Continue to view the package file attack.pacapng Analyze what the password of the hacker connecting the Trojan horse is , And will In a word, the password is used as FLAG( form :[ In a word, the password ]) Submit :
Ctrl+f
Flag:[alpha]
6. Continue to view the package file attack.pacapng Analyze what files the hacker downloaded , And put the file name and suffix As FLAG( form :[ file name . Suffix name ]) Submit :
http.request.method==POST
flag:[flag.zip]
7. Continue to view the package file attack.pacapng Extract the files downloaded by hackers , And the contents in the document are FLAG( form :[ The contents of the document ]) Submit :
binwalk -eM attack.pcapng
flag:[ flag{Manners maketh man}]
边栏推荐
- Fault analysis | mongodb 5.0 reports an error, and the legal instruction solves it
- Deep understanding of redis -- bloomfilter
- 每日刷题记录 (十二)
- 附件2-2保密承诺书.docx
- Zkevm (12) state proof of appliedzkp
- 抓包整理外篇fiddler———— 会话栏与过滤器
- 附件六:防守工作简报.docx
- First knowledge of batch processing
- 通过dd创建asm disk
- QT qtableview data column width adaptation
猜你喜欢

中職組網絡安全—內存取證

Formatted text of Kivy tutorial (tutorial includes source code)

如何构建属于自己的知识引擎?社群开放申请

Definition of DCDC power supply current

Simple g++ and GDB debugging

GUI application: socket network chat room

Share some of my telecommuting experience

Customize a pager needed in your project

Public inputs in appliedzkp zkevm (13)

Drozer tool
随机推荐
Annex III: scoring standard of the defender docx
Rollup各组件作用
VSCode的有用插件
Kivy tutorial custom fonts (tutorial with source code)
【MATLAB】MATLAB 仿真 — 模拟调制系统 之 AM 调制过程
Detailed comparison of Hynix emmc5.0 and 5.1 series
【MATLAB】MATLAB 仿真 — 窄带高斯白噪声
【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(第 I 类部分响应波形)的眼图
1. Mx6u-alpha development board (LED drive experiment in C language version)
Change the background color of Kivy tutorial (tutorial includes source code)
Encryption and decryption
Introduction and application of rampax in unity: optimization of dissolution effect
Binary search tree
Can closed data be deleted by DBCA? can
Zhongke panyun-d module analysis and scoring standard
Developing mqtt access program under QT
STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管
【MATLAB】MATLAB 仿真模拟调制系统 — VSB 系统
附件六:防守工作简报.docx
【无标题】