当前位置:网站首页>Zhongke Panyun - data analysis and forensics packet flag
Zhongke Panyun - data analysis and forensics packet flag
2022-07-04 04:59:00 【Beluga】
Data analysis and forensics
Need to be private
1. Use Wireshark View and analyze virtual machines windows 7 Under the desktop attack.pcapng Package file , through Analyzed packets attack.pcapng Find the hacker's IP Address , And put the hacker's IP Address as FLAG( form :[IP Address ]) Submit :
tcp.connection.syn
By analyzing the port , Because hackers scan common ports
Flag:[172.16.1.102]
2. Continue to view the package file attack.pacapng, Analyze which ports the hacker scanned , And make all ports by FLAG( form :[ Port name 1, Port name 2, Port name 3…, Port name n]) From low to high :
tcp.connection.syn and ip.src==172.16.1.102
Flag:[21,23,80,445,3389,5007]
3. Continue to view the package file attack.pacapng Analyze what the hacker finally gets the user name , And users Name as FLAG( form :[ user name ]) Submit :
http.request.method==POST
Flag:[Lancelot]
4. Continue to view the package file attack.pacapng Analyze what the hacker finally got the password , And make the password by FLAG( form :[ password ]) Submit :
http.request.method==POST
flag:[12369874]
5. Continue to view the package file attack.pacapng Analyze what the password of the hacker connecting the Trojan horse is , And will In a word, the password is used as FLAG( form :[ In a word, the password ]) Submit :
Ctrl+f
Flag:[alpha]
6. Continue to view the package file attack.pacapng Analyze what files the hacker downloaded , And put the file name and suffix As FLAG( form :[ file name . Suffix name ]) Submit :
http.request.method==POST
flag:[flag.zip]
7. Continue to view the package file attack.pacapng Extract the files downloaded by hackers , And the contents in the document are FLAG( form :[ The contents of the document ]) Submit :
binwalk -eM attack.pcapng
flag:[ flag{Manners maketh man}]
边栏推荐
- Several smart watch related chips Bluetooth chip low power consumption
- Notes on the paper "cross view transformers for real time map view semantic segmentation"
- Operate the server remotely more gracefully: the practice of paramiko Library
- 【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(余弦滚降成形脉冲)的眼图
- 中科磐云—数据分析与取证数据包flag
- Definition of DCDC power supply current
- 自动化测试selenium基础篇——webdriverAPI
- Kivy tutorial 07 component and attribute binding implementation button button click to modify the label component (tutorial includes source code)
- 【MATLAB】MATLAB 仿真数字基带传输系统 — 数字基带传输系统
- 中科磐云—模块A 基础设施设置与安全加固 评分标准
猜你喜欢

ADB tools

MySQL indexes and transactions

Dp83848+ network cable hot plug

A summary of the 8544 problem that SolidWorks Standard cannot obtain a license

关于solidworks standard无法获得许可 8544问题的总结

测试 CS4344 立体声DA转换器

6-4 vulnerability exploitation SSH banner information acquisition

YoloV6实战:手把手教你使用Yolov6进行物体检测(附数据集)

STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管

Change the background color of Kivy tutorial (tutorial includes source code)
随机推荐
附件一:202x年xxx攻防演习授权委托书
中科磐云—模块A 基础设施设置与安全加固 评分标准
Capturing and sorting out external Fiddler -- Conversation bar and filter
中科磐云—数据分析与取证数据包flag
Annex V: briefing on the attack process docx
Annex I: power of attorney for 202x XXX attack and defense drill
6-5漏洞利用-SSH弱口令破解利用
The second case analysis of the breakthrough of defense system from the perspective of the red team
rac删除损坏的磁盘组
附件六:防守工作简报.docx
Detailed comparison of Hynix emmc5.0 and 5.1 series
Formatted text of Kivy tutorial (tutorial includes source code)
Zkevm (12) state proof of appliedzkp
Notes on the paper "cross view transformers for real time map view semantic segmentation"
Developing mqtt access program under QT
关于solidworks standard无法获得许可 8544问题的总结
定制一个自己项目里需要的分页器
由于使用flash存放参数时,擦除掉了flash的代码区导致进入硬件错误中断
Use units of measure in your code for a better life
附件六:防守工作簡報.docx