Attached are serial captures of two different uploads to an embedded device.
Attached is a forensics capture of an HMI (human machine interface) containing scheduled tasks, registry hives, and user profile of an operator account.
Here at Reynholm Industries we pride ourselves on everything. It’s not easy to admit, but recently one of our most valuable servers was breached. We don’t believe in host monitoring so all we have is a network packet capture. We need you to investigate and determine what data was extracted from the server, if any.
Reverse engineer this little compiled script to figure out what you need to do to make it give you the flag (as a QR code).
Nobody likes analysing infected documents, but it pays the bills. Reverse this macro thrill-ride to discover how to get it to show you the key.
We intercepted some foreign documents. We think there’s interesting information inside but the file is protected with a unique password algorithm
We are provided with a server that implements a custom protocol and a packet capture of the protocol being used.
For this challenge we start off with a program which is aptly named broken
as it segfaults when run.