Imager

MediumNetwork Security

Overview

While browsing the web, I noticed some suspicious behavior — a file was extracted. Can you help determine how this file was exfiltrated?

Flag Format: Flag{file_neme|file_contents}

Lab Details

Prerequisites & Requirements

  • Network protocol analysis and packet inspection
  • Assembly language basics (x86-64 architecture)
  • Experience with network security tools like Wireshark
  • Basic understanding of reverse shells and command & control (C2) communications
  • Knowledge of malware analysis techniques
  • Understanding of fileless malware attack vectors

What will you learn?

  • How to analyze network traffic to identify malicious activities
  • Techniques for extracting and analyzing shellcode from network captures
  • How to reverse engineer assembly code to understand malware behavior
  • How to decrypt and analyze encrypted reverse shell communications
  • Understanding of fileless malware techniques that don't write files to disk
  • Network forensics techniques for incident response
  • How attackers use legitimate services (like GitHub) to host malicious payloads

Tools

  • Wireshark - Network protocol analyzer for examining the PCAP file
  • Ghidra - NSA's reverse engineering framework for shellcode analysis
  • Python - For scripting, shellcode extraction, and decryption
  • Cryptography library - For handling Fernet encryption/decryption

Job Positions

Tags

Packet AnalysisWiresharkEndpoint SecurityPcapC2