当前位置:网站首页>中科磐云—数据分析与取证数据包flag
中科磐云—数据分析与取证数据包flag
2022-07-04 04:12:00 【Beluga】
数据分析与取证
需要可私
1. 使用 Wireshark 查看并分析虚拟机 windows 7 桌面下的 attack.pcapng 数据包文件,通 过分析数据包 attack.pcapng 找出黑客的 IP 地址,并将黑客的 IP 地址作为 FLAG(形式:[IP 地址])提交:
tcp.connection.syn
通过分析端口,因为黑客都是扫描常用端口的
Flag:[172.16.1.102]
2. 继续查看数据包文件 attack.pacapng,分析出黑客扫描了哪些端口,并将全部的端口作 为 FLAG(形式:[端口名 1,端口名 2,端口名 3…,端口名 n])从低到高提交:
tcp.connection.syn and ip.src==172.16.1.102
Flag:[21,23,80,445,3389,5007]
3. 继续查看数据包文件 attack.pacapng 分析出黑客最终获得的用户名是什么,并将用户 名作为 FLAG(形式:[用户名])提交:
http.request.method==POST
Flag:[Lancelot]
4. 继续查看数据包文件 attack.pacapng 分析出黑客最终获得的密码是什么,并将密码作 为 FLAG(形式:[密码])提交:
http.request.method==POST
flag:[12369874]
5. 继续查看数据包文件 attack.pacapng 分析出黑客连接一句话木马的密码是什么,并将 一句话密码作为 FLAG(形式:[一句话密码])提交:
Ctrl+f
Flag:[alpha]
6. 继续查看数据包文件 attack.pacapng 分析出黑客下载了什么文件,并将文件名及后缀 作为 FLAG(形式:[文件名.后缀名])提交:
http.request.method==POST
flag:[flag.zip]
7. 继续查看数据包文件 attack.pacapng 提取出黑客下载的文件,并将文件里面的内容为 FLAG(形式:[文件内容])提交:
binwalk -eM attack.pcapng
flag:[ flag{Manners maketh man}]
边栏推荐
- Rhcsa 08 - automount configuration
- Balloon punching and Boolean operation problems (extremely difficult)
- ADB tools
- Annex 2-2 confidentiality commitment docx
- Deep understanding of redis -- bloomfilter
- Rhcsa 03 - Basic permissions for documents
- Cmake compilation option setting in ros2
- Many founders of technology companies provided enterpriser first with a round C financing of up to US $158million to help it invest in the next generation of global innovators
- 6-4 vulnerability exploitation SSH banner information acquisition
- rac删除损坏的磁盘组
猜你喜欢

RPC - gRPC简单的demo - 学习/实践

6-5 vulnerability exploitation SSH weak password cracking and utilization

如何构建属于自己的知识引擎?社群开放申请
![[cloud native] those lines of code that look awesome but have a very simple principle](/img/6d/220c51a643263f431fb57c97c4b8ff.png)
[cloud native] those lines of code that look awesome but have a very simple principle

Experience sharing of epidemic telecommuting | community essay solicitation

在代码中使用度量单位,从而生活更美好

RAC delete damaged disk group

6-5漏洞利用-SSH弱口令破解利用

Intersection traffic priority, illustration of intersection traffic rules

郑州正清园文化传播有限公司:针对小企业的7种营销技巧
随机推荐
Network equipment emergency response Guide
Precautions for accompanying driving these 23 points should be paid attention to!
关闭的数据能用dbca删除吗? 能
leetcode:1314. Matrix area and [2D prefix and template]
appliedzkp的zkevm(12)State Proof
(pointer) write function void fun (int x, int *pp, int *n)
rac删除损坏的磁盘组
Annex V: briefing on the attack process docx
Annex 2-2 confidentiality commitment docx
Kivy教程之 自定义字体(教程含源码)
Deep understanding of redis -- bloomfilter
Solve the problem of failed to load property source from location 'classpathapplication YML 'problem
DCDC电源电流定义
PaddleHub人脸识别方案部署,将训练好的模型在pytchrom中进行部署应用
Rhcsa 06 - suid, sgid, sticky bit (to be added)
【MATLAB】MATLAB 仿真模拟调制系统 — VSB 系统
What is the difference between Western Digital Green disk, blue disk, black disk, red disk and purple disk
Maui introductory tutorial series (5.xaml and page introduction)
RPC - grpc simple demo - learn / practice
定制一个自己项目里需要的分页器