当前位置:网站首页>Zhongke Panyun - data analysis and forensics packet flag
Zhongke Panyun - data analysis and forensics packet flag
2022-07-04 04:59:00 【Beluga】
Data analysis and forensics
Need to be private
1. Use Wireshark View and analyze virtual machines windows 7 Under the desktop attack.pcapng Package file , through Analyzed packets attack.pcapng Find the hacker's IP Address , And put the hacker's IP Address as FLAG( form :[IP Address ]) Submit :
tcp.connection.syn
By analyzing the port , Because hackers scan common ports
Flag:[172.16.1.102]
2. Continue to view the package file attack.pacapng, Analyze which ports the hacker scanned , And make all ports by FLAG( form :[ Port name 1, Port name 2, Port name 3…, Port name n]) From low to high :
tcp.connection.syn and ip.src==172.16.1.102
Flag:[21,23,80,445,3389,5007]
3. Continue to view the package file attack.pacapng Analyze what the hacker finally gets the user name , And users Name as FLAG( form :[ user name ]) Submit :
http.request.method==POST
Flag:[Lancelot]
4. Continue to view the package file attack.pacapng Analyze what the hacker finally got the password , And make the password by FLAG( form :[ password ]) Submit :
http.request.method==POST
flag:[12369874]
5. Continue to view the package file attack.pacapng Analyze what the password of the hacker connecting the Trojan horse is , And will In a word, the password is used as FLAG( form :[ In a word, the password ]) Submit :
Ctrl+f
Flag:[alpha]
6. Continue to view the package file attack.pacapng Analyze what files the hacker downloaded , And put the file name and suffix As FLAG( form :[ file name . Suffix name ]) Submit :
http.request.method==POST
flag:[flag.zip]
7. Continue to view the package file attack.pacapng Extract the files downloaded by hackers , And the contents in the document are FLAG( form :[ The contents of the document ]) Submit :
binwalk -eM attack.pcapng
flag:[ flag{Manners maketh man}]
边栏推荐
- 【MATLAB】通信信号调制通用函数 — 带通滤波器
- Annex I: power of attorney for 202x XXX attack and defense drill
- 《Cross-view Transformers for real-time Map-view Semantic Segmentation》论文笔记
- 在代码中使用度量单位,从而生活更美好
- 【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(余弦滚降成形脉冲)的眼图
- Acwing game 58
- Headache delayed double deletion
- Kivy tutorial 07 component and attribute binding implementation button button click to modify the label component (tutorial includes source code)
- 郑州正清园文化传播有限公司:针对小企业的7种营销技巧
- 中科磐云—模块A 基础设施设置与安全加固 评分标准
猜你喜欢

Annexe VI: exposé sur les travaux de défense. Docx

软件设计文档示例模板 - 学习/实践

PostgreSQL 正式超越 MySQL,这家伙也太强了吧!

MAUI 入门教程系列(5.XAML及页面介绍)

NTFS 安全权限

How do good test / development programmers practice? Where to go

Share some of my telecommuting experience

Correct the classpath of your application so that it contains a single, compatible version of com. go

Unity 接入天气系统

Annex V: briefing on the attack process docx
随机推荐
【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(第 I 类部分响应波形)的眼图
@Feignclient comments and parameters
【MATLAB】MATLAB 仿真模拟调制系统 — VSB 系统
Sample template of software design document - learning / practice
【无标题】
海力士EMMC5.0及5.1系列对比详解
记几个智能手表相关芯片 蓝牙芯片 低功耗
2022广东省赛——编码信息获取 解析flag
DCDC电源电流定义
NTFS security permissions
Flutter ‘/usr/lib/libswiftCore.dylib‘ (no such file)
Maui introductory tutorial series (5.xaml and page introduction)
[go] database framework Gorm
Operate the server remotely more gracefully: the practice of paramiko Library
【MATLAB】通信信号调制通用函数 — 傅里叶逆变换
CRS-4013: This command is not supported in a single-node configuration.
Formatted text of Kivy tutorial (tutorial includes source code)
关闭的数据能用dbca删除吗? 能
6-4 vulnerability exploitation SSH banner information acquisition
Annex VI: defense work briefing docx