forensicseasy
Suspicious Traffic
hackerlab
Task: analyze a PCAPNG capture with mostly normal QUIC/TLS/DNS traffic and identify the hidden exfiltration channel. Solution: isolate a tiny anomalous TCP stream, map payload bytes 00/20 to Morse dots and dashes, then decode the message to recover the flag.
$ ls tags/ techniques/
morse_code_decodingpcap_traffic_analysisanomaly_huntingtshark_field_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]