006
- Description: hackmyvm.eu. 100 IN TXT
Includes write-ups on the topic of Network
View all tags- Description: hackmyvm.eu. 100 IN TXT
- Description: HMV
- Difficulty: Very easy
- Difficulty: Very easy
- Description: A not really dutiful administrator has set up a DNS service for the "ch11.challenge01.root-me.org" domain...
- Description: Download this packet capture and find the flag.
- Description: Find the (supposed to be) confidential data in this ethernet frame.
- Difficulty: Very easy
- Description: Someone might have hidden the password in the trace file.
- Description: An authenticated file exchange achieved through FTP.
- Description: A really easy VM. Thats a gift
- Difficulty: Very easy
- Description nc mercury.picoctf.net 21135, but it doesn't speak English...
- Description: Download the packet capture file and use packet analysis software to find the flag.
- Description: How about some hide and seek heh?
- Description: A digital ghost has breached my defenses, and my sensitive data has been stolen! 😱💻 Your mission is to uncover how this phantom intruder infiltrated my system and retrieve the hidden flag.
- Difficulty: Very easy
- Difficulty: Very easy
- Description: We found this packet capture. Recover the flag.
- Description: Find the user password in this TELNET session capture.
- Description: Figure out how they moved the flag.
- Description: A twitter authentication session has been captured, you have to retrieve the password.
- Description: Analyze network traffic using Wireshark to investigate a web server compromise, identify web shell deployment, reverse shell communication, and data exfiltration.
- Description: Using netcat (nc) is going to be pretty important. Can you connect to jupiter.challenges.picoctf.org at port 41120 to get the flag?
- Description: I thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the rockyou.txt credential dump.