当前位置: 首页 > news >正文

14 TryHackMe 靶场 Wireshark: The Basics

转载自:Wiresharkthebasics - TryHackMe Writeups

Introduction

Which file is used to simulate the screenshots?

http1.pcapng

Which file is used to answer the questions?

Exercise.pcapng

Tool Overview

Use the "Exercise.pcapng" file to answer the questions.

For these questions we must look at the Capture File Properties.

Read the "capture file comments". What is the flag?

TryHackMe_Wireshark_Demo

What is the total number of packets?

58620

What is the SHA256 hash value of the capture file?

f446de335565fb0b0ee5e5a3266703c778b2f3dfad7efeaeccb2da5641a6d6eb

Packet Dissection

Use the "Exercise.pcapng" file to answer the questions.

View packet number 38. Which markup language is used under the HTTP protocol?

After selecting the corresponding packet, the used markup language is displayed at the bottom of the details pane.

eXtensible Markup Language

What is the arrival date of the packet? (Answer format: Month/Day/Year)

This can be found under the Frame layer.

05/13/2004

What is the TTL value?

This can be found under the IP Source layer.

47

What is the TCP payload size?

This can be found under the TCP layer.

424

What is the e-tag value?

This can be found under the HTTP layer.

E-Tag属于HTTP头部字段(在HTTP/1.1 RFC 7232中定义),主要用于:

  • 资源唯一标识:服务器为每个资源(如网页、图片)生成唯一字符串(如"5d83a-1e6-5f0b8b4a")。

  • 缓存控制:客户端通过If-None-Match请求头携带E-Tag,服务器比对后决定返回304 Not Modified(未变更)或新内容。

虽然E-Tag属于HTTP,但攻击者可能利用其进行追踪(类似Tracking Pixel):

  • 跨站点追踪:通过唯一E-Tag标识用户身份。

  • 资源枚举:探测服务器是否返回304来确认文件是否存在。

示例:

GET /file.html HTTP/1.1
Host: example.comHTTP/1.1 200 OK
ETag: "5d83a-1e6-5f0b8b4a"

9a01a-4696-7e354b00

Packet Navigation

Use the "Exercise.pcapng" file to answer the questions.

Search the "r4w" string in packet details. What is the name of artist 1?

Searching for "r4w" in the packets details pane, we get a hit for packet 43362.

r4w8173

Go to packet 12 and read the comments. What is the answer?

Package 12 contains the following comment.

Go to packet number 39765
Look at the "packet details pane". Right-click on the JPEG section and "Export packet bytes". This is an alternative way of extracting data from a capture file. What is the MD5 hash value of extracted image?

Packet Comment(数据包注释) 是人为添加到数据包中的元数据,用于标记、分类或记录额外信息。

After navigating to packet 39765 and exporting the object, we can extract its hash using md5sum.

911cd574a42865a956ccde2d04495ebf

There is a ".txt" file inside the capture file. Find the file and read it; what is the alien's name?

To get this file, we navigate to the 'export http objects' menu. Here we filter on text/plain files. This gives us one hit. From here we can preview it to find the name.

Packetmaster

Look at the expert info section. What is the number of warnings?

“分析” > “专家信息” 

The warning row has a column with the number of errors.

1636

Packet Filtering

Use the "Exercise.pcapng" file to answer the questions.

Go to packet number 4. Right-click on the "Hypertext Transfer Protocol" and apply it as a filter. Now, look at the filter pane. What is the filter query?

After applying the filter, we see the query in the display filter box.

http

What is the number of displayed packets?

At the bottom of the window we get the number of displayed packets.

1089

Go to packet number 33790 and follow the stream. What is the total number of artists?

After navigating to packet 33790 and following the http stream, we can see the entire communication stream. We can get the number of artist by looking at the stream or by exporting the relevant html file.

3

What is the name of the second artist?

Blad3

http://www.dtcms.com/a/274089.html

相关文章:

  • CIU32L051系列 DMA串口无阻塞性收发的实现
  • CentOS 安装 JDK+ NGINX+ Tomcat + Redis + MySQL搭建项目环境
  • Redis5.0.5 漏洞
  • redis的一些疑问
  • windows下安装 redis
  • Redis全栈技术导航:从基础架构到实战案例的完整指南
  • 创客匠人:AI 时代创始人 IP 打造与知识变现的范式迁移
  • 什么是IP关联?跨境卖家如何有效避免IP关联?
  • LeetCode--43.字符串相乘
  • 软件过程模型核心特征与开发流程对照表
  • Android Glide使用与底层机制详解
  • 上位机知识篇---安装包架构
  • imx6ull-系统移植篇2—— U-Boot 命令使用(上)
  • Java 中线程通信方式笔记
  • tailwindCSS === 使用插件自动类名排序
  • ssm框架整合全攻略:从环境搭建到功能实现
  • 什么是Podman?能否替代Docker?Podman快速入门
  • dockerfile 笔记
  • STM32-DAC数模转换
  • 将英语转化为语音 英文转音频 英语转语音朗读
  • 嵌入式八股文之 GPIO
  • RISC-V:开源芯浪潮下的技术突围与职业新赛道 (三)RISC-V架构深度解剖(下)
  • FPGA实现SDI转LVDS视频发送,基于GTX+OSERDES2原语架构,提供2套工程源码和技术支持
  • Spring注解IoC与JUnit整合实战
  • MyBatis-Plus通用中等、大量数据分批查询和处理
  • 蔚来测开一面:HashMap从1.7开始到1.8的过程,既然都解决不了并发安全问题,为什么还要进一步解决环形链表的问题?
  • XPath 语法【Web 自动化-定位方法】
  • [java][springboot]@PostConstruct的介绍和用法
  • 机器学习基础知识【 激活函数、损失函数、优化器、 正则化、调度器、指标函数】
  • AI加持的开源知识库新秀:PandaWiki,如何用它打造智能化文档系统?