Feb 6 · 4 min read · Introduction This room presents you with a challenge to investigate some traffic data as a part of the SOC team. Let's start working with TShark to analyse the captured traffic. We recommend completing the TShark: The Basics and TShark: CLI Wireshark...
Join discussion
Feb 7 · 2 min read · [ link: https://chatgpt.com/share/69868332-b6a0-800f-b3f5-a491c251f128 ] To read and analyze a .pcap file generated by tcpdump, use one of the methods below, depending on whether you prefer command-line or GUI tools. 1. Read a PCAP file using tcpdum...
Join discussionDec 29, 2025 · 10 min read · Introduction The Story The TBFC is very wary since the last series of attacks by the underlings of King Malhare. They are on full alert for anything happening. But they are getting restless; it is too quiet. Sir Elfo of the TBFC takes the initiative...
Join discussion
Jul 27, 2025 · 3 min read · In this challenge, we investigate a data breach involving a compromised NFS server. An intruder infiltrated the network and accessed backup files containing classified data. The only artifact available for analysis is a network packet capture (challe...
Join discussion
Jul 20, 2025 · 4 min read · Welcome to Spice Hut, a quirky startup that sells spices and sandwiches—but more importantly, has questionable security practices. As part of a penetration testing engagement, our goal was to assess their infrastructure and attempt full system compro...
Join discussion
Jul 18, 2025 · 7 min read · After last week’s Bash scripting marathon, I thought this week would be lighter. I was wrong. I tackled Git (again), jumped into Python basics, wrestled with exceptions and generators, started my AWS journey, and even squeezed in a Caesar cipher. Som...
Join discussionJun 1, 2025 · 6 min read · Practical - Network Security and Traffic Analysis Capture and analyse HTTP vs HTTPS traffic Detect malicious activity in a PCAP file using Wireshark filters The objective of this project is to capture and analyze both HTTP and HTTPS network traff...
Join discussionApr 11, 2025 · 5 min read · 💡 This write-up is a part of the HTB Sherlocks series. Sherlocks are investigative challenges that test defensive security skills. I encourage you to try them out if you like digital forensics, incident response, post-breach analysis and malware ana...
Join discussion
Apr 7, 2025 · 4 min read · 💡 This write-up is a part of the HTB Sherlocks series. Sherlocks are investigative challenges that test defensive security skills. I encourage you to try them out if you like digital forensics, incident response, post-breach analysis and malware ana...
Join discussion