gr33ppđź’€machine:~#

Curiosity.

View on GitHub

IP Addr

Category: Networking

image of challenge

On opening the challenge.pcapng file, it was a pretty big file. Well, the challenge was asking what the attacker and server ip was.

image proof

We can see that 192.168.1.7 was sending SYN packets but recieved RST packets in repeatedly. One could say that 192.168.1.7 was scanning because it was reapeated several times.

Attacker IP : 192.168.1.7 Server IP : 192.168.1.5

flag: BDSEC{192.168.1.5_192.168.1.7}