Traffic Analysis-Battle Room 8
Scenario Overview:
Player will be given a Kali 2019 box with multiple network analysis tools installed that is accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct network forensics through analysis of a PCAP.
How to be Successful:
The learner must demonstrate the ability to analyze a file to answer questions related to origins of traffic, identification of credentials in the clear, sensitive document exfiltration and database activity.
What should you know prior:
Learners should be familiar with basic intrusion detection and packet capture analysis.
Load Time | 5 min |
Time Limit | 4 hrs |
# of Tasks | 30 |
Hints | Yes |
Save Session | Yes |
Team Based | No |
Scenario Overview:
Player will be given a Kali 2019 box with multiple network analysis tools installed that is accessible through SSH or VNC terminals provided within the scenario. They will be required to conduct network forensics through analysis of a PCAP.
How to be Successful:
The learner must demonstrate the ability to analyze a file to answer questions related to origins of traffic, identification of credentials in the clear, sensitive document exfiltration and database activity.
What should you know prior:
Learners should be familiar with basic intrusion detection and packet capture analysis.
Load Time | 5 min |
Time Limit | 4 hrs |
# of Tasks | 30 |
Hints | Yes |
Save Session | Yes |
Team Based | No |