PFW ACM's CTF Practice

PFW ACM's CTF Practice

Home Resources Open-Source Intelligence Cryptography Password Cracking Wi-Fi Traffic Analysis Log Analysis Network Vulnerability Analysis Digital Forensics Reverse Engineering Web App Exploitation

Network Scanning

When computers send requests through a network they gather information about their path. By tracking where a computer is going in the network, we can gather information about the network's structure.

Some advanced network scanning software (such as NMap or DirBuster) allow you to select different scan types to gain different types of information. We strongly suggest having nmap on your device for these challenges.

Challenges