forensicseasy
exFill
grodno_new_year_2026
Task: Network forensics challenge with a PCAP file containing traffic from a penetration test on a Metasploitable machine. Solution: Reconstructed the attacker's shell session on port 6200, extracted the base64-encoded exfiltrated JPEG from the netcat transfer on port 4444, decoded it, and found the flag embedded in the image strings.
$ ls tags/ techniques/
base64_decodingstrings_extractionpcap_analysistcp_stream_reconstruction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]