Skip to content

404 FTW

404 FTW                                Web Ring                                A picture containing clipart

Description automatically generatedAlabaster Snowball

A picture containing text

Description automatically generated

Graphical user interface

Description automatically generated

Open victim.pcap in Wireshark and filter with traffic coming from 18.222.86.32 with HTTP status 200 and 404

Filter :
http && ip.dst==18.222.86.32
Display filter :
http.response.code==200 or http.response.code==404

Note the first successful attack with HTTP 200 OK

Examining the HTTP content of the selected traffic we see the request was successful for /proc

Examining the HTTP content of the selected traffic we see the request was successful for /proc

Answer : /proc

Upon submitting the answer, objective is now completed, and we get 5 coins.