forensicsProeasy
exFill
grodno_new_year_2026
Task: Network forensics challenge with a PCAP file containing traffic from a penetration test on a Metasploitable machine. Solution: Reconstructed the attacker's shell session on port 6200, extracted the base64-encoded exfiltrated JPEG from the netcat transfer on port 4444, decoded it, and found the flag embedded in the image strings.
$ ls tags/ techniques/
base64_decodingstrings_extractionpcap_analysistcp_stream_reconstruction
π
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [forensics][Pro]Baby Exfilβ uoftctf2026
- [forensics][Pro]Name Callingβ bluehensctf
- [forensics][Pro]ΠΠ±ΡΠ΅Π½ΠΈΠ΅ (Communication)β hackerlab
- [forensics][Pro]Advanced Packaged Threatβ scarlet
- [forensics][free]Obscureβ hackthebox