Start the machine, hack the system, and find the hidden flags to complete this challenge and earn points!
This walkthrough explains how to hack the lab and capture the flags. For help with Learning Mode questions, use the Request Hint button next to each question.
dns_exfil.pcap in Wireshark or your preferred network analysis tool.dnstshark installed, you can install it as follows:# On Ubuntu/Debian:
sudo apt-get install tshark
# On macOS (with Homebrew):
brew install wireshark
# On CentOS/RHEL:
sudo yum install wiresharktcpdump.tshark to extract all DNS query names:tshark -r dns_exfil.pcap -T fields -e dns.qry.name -Y 'dns'www.google.com), but instead look like random strings followed by attacker.com.YTdiM2M5ZDEtZTVmMi00YThiLTljNmQtM2U3ZjhhMmI1Yzlk.attacker.com.YTdiM2M5ZDEtZTVmMi00YThiLTljNmQtM2U3ZjhhMmI1Yzlkecho 'YTdiM2M5ZDEtZTVmMi00YThiLTljNmQtM2U3ZjhhMmI1Yzlk' | base64 -da7b3c9d1-e5f2-4a8b-9c6d-3e7f8a2b5c9dtshark -r dns_exfil.pcap -T fields -e dns.qry.name -Y 'dns' | grep 'attacker.com' | cut -d'.' -f1 | tr -d '
' | base64 -dxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxa7b3c9d1-e5f2-4a8b-9c6d-3e7f8a2b5c9dChoose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email