![]() ![]() ![]() ![]() I saw your basic HTTP, DNS, SSL packets and sessions. Tony: Starting at the top with Frame #1 I started scrolling down just trying to get a high-level understanding of what I was looking at. Once I had the PCAP stored locally, I opened it with Wireshark and began to dive in. You could also download the PCAP to analyze it with other tools. To start the challenge, you could use Cloudshark’s tool online, which is basically a browser based wireshark with additional analysis features. I (Tony) originally saw the post on Cloudsharks’s twitter account weeks prior I (Tony) participated in OpenSOC.io Blue Team CTF which had a PCAP element to it and the fire for my love of PCAP CTF’s was re-lit. This challenge was a lot of fun, and we thank Cloudshark for creating it for the public. Two SealingTech employees, Tony Efantis and Scott Lohin, participated in the challenge and found all five pumpkins. During Halloween, a company called Cloudshark released a Packet Capture challenge that involved finding hidden “pumpkins” that were hidden in packets. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |