This month's challenge is to make sense of a seemingly innocuous flurry of UDP packets. All submissions are due no later then , Friday, 21 June. Results will be released Friday, 28 June.
Skill Level: Intermediate
On the evening of Feb 15th, three different members of the Honeynet Research Alliance received a flurry of strange UDP packets, that at first look seemed to have no apparent purpose. This month's Scan of the Month challenge is to understand the purpose of these packets. Using the Snort binary capture of one of the Honeynets, answer the following questions. The Honeynet that is scanned is on the 172.16.1.0/24 network. Also, keep in mind these packets were recorded on a system in the GMT timezone. When reviewing this binary capture on your system, it may convert the times of the packet captures to the local timezone of your system. Send all submissions to [email protected]
[email protected] MD5 = 58abd0cb0cbe4c31930225dd229352a5
Writeup from the Honeynet
Project / Honeynet Research
Writeup from the Security Community.
Next 10 Entries