Imager vof
MediumNetwork Security
Overview
While browsing the web, I noticed some suspicious behavior — a file was extracted. Can you help determine how this file was exfiltrated?
Flag Format: Flag{file_neme|file_contents}
Lab Details
Prerequisites & Requirements
- Network protocol analysis and packet inspection
- Understanding of HTTP traffic and web requests
- Knowledge of shellcode analysis and reverse engineering
- Assembly language basics (x86-64 architecture)
- Understanding of system calls and execve functionality
- Cryptography fundamentals (symmetric encryption with Fernet)
- Experience with network security tools like Wireshark
- Basic understanding of reverse shells and command & control (C2) communications
- Knowledge of malware analysis techniques
- Understanding of fileless malware attack vectors
What will you learn?
- How to analyze network traffic to identify malicious activities
- Techniques for extracting and analyzing shellcode from network captures
- How to reverse engineer assembly code to understand malware behavior
- Methods for identifying encrypted communication channels
- How to decrypt and analyze encrypted reverse shell communications
- Understanding of fileless malware techniques that don't write files to disk
- Network forensics techniques for incident response
- How attackers use legitimate services (like GitHub) to host malicious payloads
Tools
- Wireshark
- Ghidra
- Python
- Text editors
Job Positions
Tags
PcapWiresharkPacket AnalysisC2Layer 7 Attacks