반응형 cybersecurity4 Securinets Prequals 2K19 Write-up (Easy Trade) This is a basic forensic question. This is my approach. I only used Wireshark Follow TCP Stream feature. Fortunately, the provided pcap file is not big so I skimmed every line. In the pcap file I found some clues for the flag. Between hosts exchanged the key and flag.txt is sent in a zip file. >> 50 40 03 04 is the signature for zip file I used the Follow TCP Stream function (Analyze >> Follow >.. 2019. 3. 24. TAMUctf '19 Write-up (I heard you like files) As we open the uploaded file, we can see below image. After I downloaded this file, I checked the hidden file itself by binwalk command. $ binwalk art.png DECIMAL HEXADECIMAL DESCRIPTION--------------------------------------------------------------------------------0 0x0 PNG image, 1920 x 1080, 8-bit/color RGBA, non-interlaced3408641 0x340301 PDF document, version: "1.5"3408712 0x340348 Zlib com.. 2019. 3. 24. TAMUctf '19 Write-up (Hello World) As we open the uploaded file, we can see a bunch of tabs and spaces. So I googled whitespace decoder on the Internet. And I got this website to decode whitespaces. >> https://vii5ard.github.io/whitespace/I simply copied and pasted the whitespaces part on the web and I got a below message.As we know we have to find a flag, however, it has nothing at all. Actually, I used this tool for the first t.. 2019. 3. 24. Security Engineer (Analyst) Intern Interview Questions 1. What is an antivirus and why antivirus needs for organizations?2. Explain Vulnerability, Risk, and Threat3. What is DDoS and how to mitigate?4. Explain Asymmetric and Symmetric encryption?: Follow up questions - If I focused on the speed, symmetric is better or asymmetric is better? Tell me the reasons5. Tell me Hashing, Encryption, and Encoding?6. Explain IDS and IPS7. What is a firewall?8. .. 2019. 2. 19. 이전 1 다음 반응형