Watchtower of Mists
Personal Rating: Easy
The challenge starts off with a pcap file. The first thing I like to do with pcap files is to search for any plaintext traffic in Wireshark. HTTP traffic could be found and exhibited suspicious contents:

Decoding the base64 strings shows that the following commands were executed on the target host (with reply):
whoami
userThis shows basic enumeration was done on the target, followed by the execution of a bash reverse shell.
Last updated