networkhard

First Nightmare

grodno_new_year_2026

Task: Custom TCP protocol challenge requiring a payload with MD5 hash computed from the TCP sequence number. Solution: Used Scapy raw sockets with a random ISN (not zero) to perform the TCP handshake, computed md5(str(seq) + "get_flag") for the data packet payload, and blocked kernel RST packets via iptables in Docker.

$ ls tags/ techniques/
raw_socket_tcpisn_randomizationtcp_handshakepayload_construction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]