networkhard
First Nightmare
grodno_new_year_2026
Task: Custom TCP protocol challenge requiring a payload with MD5 hash computed from the TCP sequence number. Solution: Used Scapy raw sockets with a random ISN (not zero) to perform the TCP handshake, computed md5(str(seq) + "get_flag") for the data packet payload, and blocked kernel RST packets via iptables in Docker.
$ ls tags/ techniques/
raw_socket_tcpisn_randomizationtcp_handshakepayload_construction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]