Start the machine, hack the system, and find the hidden flags to complete this challenge and earn points!
dns_exfil.pcap in Wireshark or your preferred network analysis tool.dnstshark installed, you can install it as follows:# On Ubuntu/Debian:
sudo apt-get install tshark
# On macOS (with Homebrew):
brew install wireshark
# On CentOS/RHEL:
sudo yum install wiresharktcpdump.tshark to extract all DNS query names:tshark -r dns_exfil.pcap -T fields -e dns.qry.name -Y 'dns'www.google.com), but instead look like random strings followed by attacker.com.YTdiM2M5ZDEtZTVmMi00YThiLTljNmQtM2U3ZjhhMmI1Yzlk.attacker.com.YTdiM2M5ZDEtZTVmMi00YThiLTljNmQtM2U3ZjhhMmI1Yzlkecho 'YTdiM2M5ZDEtZTVmMi00YThiLTljNmQtM2U3ZjhhMmI1Yzlk' | base64 -da7b3c9d1-e5f2-4a8b-9c6d-3e7f8a2b5c9dtshark -r dns_exfil.pcap -T fields -e dns.qry.name -Y 'dns' | grep 'attacker.com' | cut -d'.' -f1 | tr -d '
' | base64 -dxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxa7b3c9d1-e5f2-4a8b-9c6d-3e7f8a2b5c9dEnter your email to continue
Choose a username to get started
We've sent a 9-character code to your email