BTJA Wireshark Challenge - PCAP 2 Walkthrough
Octavious W.
Incident Response | Digital Forensics | Vulnerability Analysis | Security+ | CHFI | CEH | Cisco Certified CyberOps Associate | GFACT | GSEC (2025) | GCIH (2025)
Summary:
My walkthrough of analyzing PCAP 2 of the Wireshark Challenge from Security Blue Team’s Blue Team Junior Analyst Pathway
1. What is the WebAdmin password?
2. What is the version number of the attacker’s FTP server?
领英推荐
3. Which port was used to gain access to the victim Windows host?
4. What is the name of a confidential file on the Windows host?
5. What is the name of the log file that was created at 4:51 AM on the Windows host?
Conclusion:
Tech Adventurer | Network Security Enthusiast | Pursuing CCNA & Fortinet Pro Certification | HackMiami Collaborator | Top 7% TryHackMe Rank | Fusing Experience, Learning, & Practical Skills in IT & Network Security
1 年I followed the TCP stream of TCP Retransmission packet 4258 which dropped me in at stream 2079. what made you choose packet 4258 to investigate?