Skip to content

AACC CYBER COMPETITION PRACTICE

  • Challenges
    • Cryptography
      • *Crypto Tips/Tools
      • Crypto 1
      • Crypto 10
      • Crypto 2
      • Crypto 3
      • Crypto 4 (E)
      • Crypto 5 (E)
      • Crypto 6 (E)
      • Crypto 7 (E)
      • Crypto 8 (M)
      • Crypto 9 (M)
    • Log Analysis Challenges
      • * Log Tips/Tools
      • Logs 1
      • Logs 2 (H)
      • Logs 3
      • Logs[QTL-Question id=146] 4 – FTP.log
    • Network Traffic Analysis
      • * Network Traffic Tips/Tools
      • Network Traffic 1
      • Network Traffic 2
      • Network Traffic 3 (E)
      • Network Traffic 4 (M)
      • Network Traffic 5 (M)
      • Network Traffic 6 (H)
      • Network Traffic 7
    • Open Source Intelligence
      • *OSINT Tips/Tools
      • OSINT 1
      • OSINT 2 (E)
      • OSINT 3 (M)
      • OSINT 4 (H)
      • OSINT 5
      • OSINT 6
      • OSINT 7 (H)
    • Password Cracking Challenges
      • *Password Tips/Tools
      • Passwords 1 (E)
      • Passwords 2 (M)
      • Passwords 3 (M)
      • Passwords 4 (M)
      • Passwords 5 (H)
      • Passwords 6
      • Passwords 7
      • Passwords 8
    • Scanning
    • Wireless
      • Wireless 1
      • Wireless 2 – WPA
      • Wireless Tips & Tools
  • Competition List
    • Montgomery CC CTF
    • National Cyber League (NCL) 2018
  • About
  • Contact

Network Traffic Analysis

These challenges will test your ability to analyze network traffic.
Interested in some tips on how to solve Network Traffic Analysis challenges?

Network Traffic 1 – DNS traffic
Network Traffic 2 – file download
Network Traffic 3 (E) – DNS traffic
Network Traffic 4 (M) – Travel traffic
Network Traffic 5 (M) – Real Estate traffic
Network Traffic 6 (M) – Vacation traffic
Network Traffic 7 (H) – Your first hack!

Like this:

Like Loading...
Create a website or blog at WordPress.com
%d