일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |
- 웹
- 대칭키암호
- Symmetric key crypto
- Symmetric key algorithm
- 파이썬 문법
- C언어
- 암호수학
- 암호
- Stream cipher
- network forensic
- 파이썬
- Symmetric key
- 파이썬 문제
- 대칭키 암호
- NFPC
- WEB
- forensic
- block cipher
- c
- Defcon
- pythonchallenge
- The python challenge
- 파이썬 공부
- DefCon 21
- 네트워크
- python
- 암호학
- CTF
- php
- 포렌식
- Today
- Total
목록NFPC (3)
Hardner
DEFCON 2013 Network Forensics Puzzle Contest: Mystery Date Gregory, still unsure of Betty's true identity, meets with a group identifying themselves as Betty's Associates. They gave him a list of demands including numbers to bank accounts, and additional secret documents. Betty's Associates told Gregory he will be provided with information regarding the delivery of the goods. Use the Round 4 pac..
DEFCON 2013 Network Forensics Puzzle Contest: On the Trail Gregory is hesitant to meet with the mysterious Betty. While working late in the office, Gregory hears his phone ring.He checks his phone and knows he has no choice but to attend the meeting with Betty. Use the Round 3 packet capture in this folder to answer the following question: 1.What will Gregory die from, if he fails to meet with B..
DEFCON 2013 Network Forensics Puzzle Contest: Track Star Betty attempts to keep her tracks covered as she establishes a meeting location with Gregory. Use the Round 2 packet capture in this folder to answer the following question: 1. What city are they meeting? MD5 CHECKSUM: round2.pcap: 7d0273b7e867f90feb80ce31fe077c90 Remember: You must answer the question in this round, in order to unlock the..