PFW ACM's CTF Practice

PFW ACM's CTF Practice

Home Resources Open-Source Intelligence Cryptography Password Cracking Wi-Fi Traffic Analysis Log Analysis Network Vulnerability Analysis Digital Forensics Reverse Engineering Web App Exploitation

Network Traffic Analysis

Computers need to communicate. However, they don't whisper messages to a server or router secretly, they shout so that everyone can hear them. Typically, you can't hear the din of requests, but with some special programs, you can.

One such program is called 'Wireshark'. We strongly recommend that you use wireshark when attempting these challenges.

Challenges