forensicseasy

Suspicious Traffic

hackerlab

Task: analyze a PCAPNG capture with mostly normal QUIC/TLS/DNS traffic and identify the hidden exfiltration channel. Solution: isolate a tiny anomalous TCP stream, map payload bytes 00/20 to Morse dots and dashes, then decode the message to recover the flag.

$ ls tags/ techniques/
morse_code_decodingpcap_traffic_analysisanomaly_huntingtshark_field_extraction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]