CTF link.
Sometimes you can exfiltrate data with more than just plain text. Can you figure out how the attacker smuggled out the flag on our network?
If we examine HTTP requests, we notice the flag in the ASCII DUMP section.
swampCTF{w3lc0m3_70_7h3_l4nd_0f_7h3_pc4p}
Hello, I am Aleyna Doğan. I work as a Sr. Cyber Threat Intelligence Analyst. In my blog, we write blog posts that my friends and I want to share. Have a good read.