Network
Filter
Name : FTP
Category : Network
Level : Easy (5 pts)
Author : VirtualSamurai
Date : 2020-01-21 15:56:46
Description :
You managed to steal a file containing a capture of a communication between two machines via the FTP protocol.
Find the password of the user that accessed the FTP server.
Rated : 6 / 10
🩸 First Blood : Mika
Signup Login
Name : Basic_Auth
Category : Network
Level : Easy (5 pts)
Author : VirtualSamurai
Date : 2020-01-22 01:24:29
Description :
During one of your pentests, you managed to capture a communication through the HTTP protocol.
Can you find any password in it ?
Rated : 6 / 10
🩸 First Blood : Mika
Signup Login
Name : trame from scratch
Category : Network
Level : Medium (15 pts)
Author : 0wnes1s
Date : 2020-06-06 22:11:17
Description : A new technology company is under construction near you. During the installation of the optic fiber, you managed to connect to the cable, to retrieve the light signals. Once the signals are decoded in binary, you have to reformat the ethernet frame and find the source mac address and the destination ip address. Flag format: `<mac_src>:<ip_dst>` (ex: `a1:b2:c3:d4:e5:f6:10.10.10.1`)
Rated : 6 / 10
🩸 First Blood : Vergogne
Signup Login
Name : proc's & net
Category : Network
Level : Easy (5 pts)
Author : 0wnes1s
Date : 2020-06-09 12:41:20
Description : E-Corp's server has been breached, here's what you have been sent. It's up to you to find out who logged on to the server and by which service it came in. Flag format: `<remote_ip>:<local_port>`
Rated : 5 / 10
🩸 First Blood : cogitot
Signup Login
Name : new password
Category : Network
Level : Medium (15 pts)
Author : 0wnes1s
Date : 2020-06-09 22:20:55
Description : One of the administrators noticed the intrusion attempt on the ecorp.com website and changed his password. Fortunately, you were able to run tcpdump on the server. You don't have a nice pcap file, but you have the essentials to retrieve the new password. Flag format: `<new_passwd>`
Rated : 8 / 10
🩸 First Blood : croucroute
Signup Login