Another day, another packet challenge. For this particular challenge I’m looking for 2 things:
1) Name the exploit that was used to compromise the system.
2) Tell me what was done to system after it was compromised.
Because of the number of packets in this challenge, I’ve decided to make the capture files available for download. While this means we won’t get to experience pure joy that comes from using a fine tool such as text2pcap, I’m sure no one would look forward to converting 60+ packets.
The capture file can be download from the I Smell Packets Google group located at the following URL:
The filename is:
Send you answers to chris (dot) christianson (at) gmail (dot) com.
1 Comment so far
Leave a comment