forensicsProeasy
Hens can type?
bluehensctf
Task: PCAPNG with USB traffic from usbmon0 containing HID keyboard data. Solution: Extract 8-byte HID reports from usb.capdata, decode USB keyboard scancodes to reconstruct typed text revealing the flag.
$ ls tags/ techniques/
usb_hid_keyboard_decodingusb_capdata_extractionscancode_mapping
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [misc][Pro]Pechatnaya Mashinka— hackerlab
- [forensics][Pro]Новый сотрудник 2 (New Employee 2)— hackerlab
- [misc][Pro]Blind Hens— bluehens_ctf_2026
- [crypto][Pro]Eggs Over Easy— bluehensctf
- [forensics][Pro]Name Calling— bluehensctf