Watchtower of Mists

Personal Rating: Easy

The challenge starts off with a pcap file. The first thing I like to do with pcap files is to search for any plaintext traffic in Wireshark. HTTP traffic could be found and exhibited suspicious contents:

Decoding the base64 strings shows that the following commands were executed on the target host (with reply):

whoami
user

This shows basic enumeration was done on the target, followed by the execution of a bash reverse shell.

Last updated