

At the end of challenge 2 we find out the zip archive contains a wav audio file called out.wav. It was tough in that there were multiple hurdles to get over if one was not skilled in a particular topic. It doesn’t have as much hype as the original. The packet analyzation tool Wireshark is used to load up this capture so we can check each packet and see what type of content we’re dealing with.Ĭapturing the flag Challenge 3 - Sandstormįlash back to 1999 when Darude released this epic track! Wait a second… this version doesn’t sound right. The first challenge for the month pertains to a mysterious. We need your help to figure out what’s going on here. What the crap!? What kind of pcap data is this? Here is what you can expect to see during this Month's Challenge: - Packet Analysis - Forensics - These will range from beginner to advanced Available Tools: - None - July's challenge will be the 'download and analyze' type using your own tools Challenge 1 - Pcap: WTF is this!? After getting the challenges and reviewing the rules it seems my assumptions were not that far off. I assumed based off the name that the challenges would be dealing with archives, steganography, or a combination of both. This month’s challenge set includes 3 levels and is named “Jam_Packed”.


July brings another set of challenges from the Hackmethod team. Hackmethod July 2017 - Challenges Write Up
