Difficulty
easy
Average duration
1 hrs
Technologies
wireshark
network analysis
pcap
base64
cybersecurity
forensics
blue-team
Difficulty
easy
Average duration
1 hrs
Technologies
wireshark
network analysis
pcap
base64
cybersecurity
forensics
blue-team
In this lab, you will receive network evidence captured in a .pcap
file. This file contains an HTTP transaction between a client and a local server, and it is suspected that a flag is hidden within that communication.
In this lab you will learn:
.pcap
files👉 This challenge is solved inside a preconfigured virtual machine with Wireshark and a graphical environment. No additional software installation or traffic simulation is required: you will analyze a pre-captured .pcap
file directly.
1https:/cybersecurity-machines/redflag-lab.ova
student:4geeks-lab
.An internal system made an HTTP request to a local server, which responded with unexpected content. The transmission was intercepted by a network sensor and is now in your hands: a .pcap
file with the complete conversation. Your job as an analyst is clear: Examine the HTTP conversation for data that shouldn't be there.
It is rumored that the server delivered a suspicious string — there are no unusual headers, no obvious errors... just a simple response. But remember: simple things sometimes hide more than they show.
Tip: pay special attention to the response body. Sometimes messages are not in plain text, but masked with basic techniques like encoding. If you see a long, meaningless string... maybe it's not as random as it seems.
redflag.pcap
file in Wireshark. The redflag.pcap
file is located on the desktop.tcp.port == 8080
4GEEKS{EXAMPLE_FLAG}
, then you have found the flag.Good luck, Forensic Analyst!
Difficulty
easy
Average duration
1 hrs
Technologies
wireshark
network analysis
pcap
base64
cybersecurity
forensics
blue-team
Difficulty
easy
Average duration
1 hrs
Technologies
wireshark
network analysis
pcap
base64
cybersecurity
forensics
blue-team
Difficulty
easy
Average duration
1 hrs
Technologies
wireshark
network analysis
pcap
base64
cybersecurity
forensics
blue-team
Difficulty
easy
Average duration
1 hrs
Technologies
wireshark
network analysis
pcap
base64
cybersecurity
forensics
blue-team
Difficulty
easy
Average duration
1 hrs
Technologies
wireshark
network analysis
pcap
base64
cybersecurity
forensics
blue-team
Difficulty
easy
Average duration
1 hrs
Technologies
wireshark
network analysis
pcap
base64
cybersecurity
forensics
blue-team