- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
TryHackMe Stolen Mount | NFS | From Wireshark PCAP to QR Code Flag!
Analyse network traffic related to an unauthenticated file share access attempt, focusing on potential signs of data exfiltration.
➡️ Room Link: https://tryhackme.com/room/hfb1stolenmount
😸Scenario:😸
An intruder has infiltrated our network and targeted the NFS server where the backup files are stored. A classified secret was accessed and stolen. The only trace left behind is a packet capture (PCAP) file recorded during the incident. Your mission, should you accept it, is to discover the contents of the stolen data.
🚩🚩In this video, we're tackling the "Stolen Mount" CTF room! Join me as we dive into a network packet capture to uncover a conspiracy, one command at a time.
🚨This walkthrough is a perfect example of a real-world digital forensics investigation. We'll start with a suspicious PCAP file, analyze the NFS traffic in Wireshark, and extract a hidden file directly from the network stream. Then, we'll use the power of CyberChef to make sense of our findings.
🚨The trail doesn't stop there! We'll discover an embedded zip archive and I'll show you how to carve it out using two essential forensics tools: binwalk and foremost. The final challenge is a QR code, which we'll decode using both a simple online tool and the powerful Linux command zbarimg to capture the final flag.
If you want to learn practical skills in network forensics and file carving, this video is for you!
🛠️ Tools Used:
✅ Wireshark
✅ CyberChef
✅ Binwalk
✅ Foremost
✅ ZBar (zbarimg)
✅ Online QR Code Reader
#StolenMount #CTF #Wireshark #CyberSecurity #Forensics
Видео TryHackMe Stolen Mount | NFS | From Wireshark PCAP to QR Code Flag! канала Djalil Ayed
➡️ Room Link: https://tryhackme.com/room/hfb1stolenmount
😸Scenario:😸
An intruder has infiltrated our network and targeted the NFS server where the backup files are stored. A classified secret was accessed and stolen. The only trace left behind is a packet capture (PCAP) file recorded during the incident. Your mission, should you accept it, is to discover the contents of the stolen data.
🚩🚩In this video, we're tackling the "Stolen Mount" CTF room! Join me as we dive into a network packet capture to uncover a conspiracy, one command at a time.
🚨This walkthrough is a perfect example of a real-world digital forensics investigation. We'll start with a suspicious PCAP file, analyze the NFS traffic in Wireshark, and extract a hidden file directly from the network stream. Then, we'll use the power of CyberChef to make sense of our findings.
🚨The trail doesn't stop there! We'll discover an embedded zip archive and I'll show you how to carve it out using two essential forensics tools: binwalk and foremost. The final challenge is a QR code, which we'll decode using both a simple online tool and the powerful Linux command zbarimg to capture the final flag.
If you want to learn practical skills in network forensics and file carving, this video is for you!
🛠️ Tools Used:
✅ Wireshark
✅ CyberChef
✅ Binwalk
✅ Foremost
✅ ZBar (zbarimg)
✅ Online QR Code Reader
#StolenMount #CTF #Wireshark #CyberSecurity #Forensics
Видео TryHackMe Stolen Mount | NFS | From Wireshark PCAP to QR Code Flag! канала Djalil Ayed
Комментарии отсутствуют
Информация о видео
13 июля 2025 г. 10:45:08
00:18:46
Другие видео канала




















