kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024Phonetic | CryptographyProblem Statement Encrypted text: Bravo Uniform Bravo Tango Four Lima Whiskey Four Yankee Five Seven Hotel One November Kilo Three Four Five Yankee Flag Format: BUBT{word1_word2_word3} Hint: lower case Prerequisites <not sure what to put here> (...DiscussCyber Skills Bootcamp Competition | BUBTbubt
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024ffuuuuunnyyy!! | SteganographyProblem Statement Sometimes what you see doesn’t happen. Could you tell me what you see in this file? Flag Format: BUBT{something} ffuuunnnnyyyyy.png Prerequisites <not sure what to put here> Solution Since the file is not opening normally, I s...DiscussCyber Skills Bootcamp Competition | BUBTmagic bytes
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS6 | Network Security SeriesProblem Statement Knowing the attacker's user-agent assists in creating robust filtering rules. What's the attacker's user agent? Flag Format: BUBT{Full User Agent} network_artifacts.pcapng Prerequisites Wireshark (viewing packet details) Solut...DiscussCyber Skills Bootcamp Competition | BUBTbubt
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS5 | Network Security SeriesProblem Statement Understanding the value of compromised data assists in prioritizing incident response actions. What file was the attacker trying to exfiltrate? Flag Format: BUBT{filename} network_artifacts.pcapng Prerequisites Wireshark (basi...DiscussCyber Skills Bootcamp Competition | BUBTbubt
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS4 | Network Security SeriesProblem Statement Identifying the port utilized by the web shell helps improve firewall configurations for blocking unauthorized outbound traffic. What port was used by the malicious web shell? Flag Format: BUBT{PortNo} network_artifacts.pcapng ...DiscussCyber Skills Bootcamp Competition | BUBTCTF Writeup
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS3 | Network Security SeriesProblem Statement Knowing the directory where files uploaded are stored is important for reinforcing defenses against unauthorized access. Which directory is used by the website to store the uploaded files? Flag Format: BUBT{///} network_artifact...DiscussCyber Skills Bootcamp Competition | BUBTbubt
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS2 | Network Security SeriesProblem Statement We need to identify if there were potential vulnerabilities exploited. What's the name of the malicious web shell uploaded? Flag Format: BUBT{..*} network_artifacts.pcapng Prerequisites Wireshark (basic use of filters, followin...DiscussCyber Skills Bootcamp Competition | BUBTWireshark
kurtnettlekurtnettle.hashnode.dev·Nov 24, 2024NS1 | Network Security SeriesProblem Statement An anomaly was identified within our company's intranet when the Development team discovered an unfamiliar file on one of our web servers. Fearing possible malicious activity, the network team has captured a pcap file containing ...DiscussCyber Skills Bootcamp Competition | BUBTbubt