Imager
MediumNetwork Security
Overview
While browsing the web, I noticed some suspicious behavior — a file was extracted. Can you help determine how this file was exfiltrated?
Flag Format: Flag{file_neme|file_contents}
Lab Details
Prerequisites & Requirements
- Network protocol analysis and packet inspection
- Assembly language basics (x86-64 architecture)
- Experience with network security tools like Wireshark
- Basic understanding of reverse shells and command & control (C2) communications
- Knowledge of malware analysis techniques
- Understanding of fileless malware attack vectors
What will you learn?
- How to analyze network traffic to identify malicious activities
- Techniques for extracting and analyzing shellcode from network captures
- How to reverse engineer assembly code to understand malware behavior
- How to decrypt and analyze encrypted reverse shell communications
- Understanding of fileless malware techniques that don't write files to disk
- Network forensics techniques for incident response
- How attackers use legitimate services (like GitHub) to host malicious payloads
Tools
- Wireshark - Network protocol analyzer for examining the PCAP file
- Ghidra - NSA's reverse engineering framework for shellcode analysis
- Python - For scripting, shellcode extraction, and decryption
- Cryptography library - For handling Fernet encryption/decryption
Job Positions
Tags
Packet AnalysisWiresharkEndpoint SecurityPcapC2