Pcap attack trace.A packet analysis exercise that involves extracting and analyzing exploit code to understand how the attack was performed and the caused damage.

# Question Weight Solved
1 What is the encryption type used in the TCP stream? 50 40

2 What is the name of the exploited service? 100 23

3 What is the operating system running on the targeted host? 100 17

4 What is the packet number for the initial stage of the exploit? 100 32

5 What is the CVE number of exploited vulnerability? 200 21

6 What was the initial Function call in Stage1? Provide the function name. 250 5

7 What are the XOR keys used in Stage1? (comma-separated). 300 5

8 What was the MAGIC constant sent to the server? 300 4

9 What was the XOR Key used to decode stage2? 300 3

10 What is the name of the file created by stage2? 300 3

11 What is the content of the secret message? 500 4