<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Lucky Defaulter</title>
    <description>The latest articles on DEV Community by Lucky Defaulter (@lucky-cyber3008).</description>
    <link>https://dev.to/lucky-cyber3008</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3337581%2F6b19935f-ee0f-4c67-b887-8dc5e3657087.png</url>
      <title>DEV Community: Lucky Defaulter</title>
      <link>https://dev.to/lucky-cyber3008</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/lucky-cyber3008"/>
    <language>en</language>
    <item>
      <title>[Boost]</title>
      <dc:creator>Lucky Defaulter</dc:creator>
      <pubDate>Fri, 11 Jul 2025 03:34:10 +0000</pubDate>
      <link>https://dev.to/lucky-cyber3008/-214a</link>
      <guid>https://dev.to/lucky-cyber3008/-214a</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/lucky-cyber3008" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3337581%2F6b19935f-ee0f-4c67-b887-8dc5e3657087.png" alt="lucky-cyber3008"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/lucky-cyber3008/tryhackme-pickle-rick-walkthrough-complete-beginners-guide-aem" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;TryHackMe Pickle Rick Walkthrough | Complete Beginner’s Guide&lt;/h2&gt;
      &lt;h3&gt;Lucky Defaulter ・ Jul 11&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#tryhackme&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#infosec&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>tryhackme</category>
      <category>ctf</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>TryHackMe Pickle Rick Walkthrough | Complete Beginner’s Guide</title>
      <dc:creator>Lucky Defaulter</dc:creator>
      <pubDate>Fri, 11 Jul 2025 03:31:50 +0000</pubDate>
      <link>https://dev.to/lucky-cyber3008/tryhackme-pickle-rick-walkthrough-complete-beginners-guide-aem</link>
      <guid>https://dev.to/lucky-cyber3008/tryhackme-pickle-rick-walkthrough-complete-beginners-guide-aem</guid>
      <description>&lt;h1&gt;
  
  
  🥒 TryHackMe Pickle Rick — Full Walkthrough for Beginners
&lt;/h1&gt;

&lt;p&gt;Hey everyone! 👋&lt;br&gt;&lt;br&gt;
In this walkthrough, I’ll take you step by step through the &lt;strong&gt;Pickle Rick&lt;/strong&gt; room on &lt;strong&gt;TryHackMe&lt;/strong&gt; — a fun, beginner-friendly &lt;strong&gt;CTF&lt;/strong&gt; inspired by &lt;em&gt;Rick and Morty&lt;/em&gt;.  &lt;/p&gt;

&lt;p&gt;You’ll learn how to:&lt;br&gt;&lt;br&gt;
✅ Scan for open ports with &lt;strong&gt;Nmap&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
✅ Discover hidden directories with &lt;strong&gt;Gobuster&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
✅ Enumerate Linux file systems&lt;br&gt;&lt;br&gt;
✅ Get &lt;strong&gt;root flags&lt;/strong&gt; and complete the room!&lt;/p&gt;

&lt;p&gt;So fire up your terminal, grab your portal gun 🌀, and let’s help Rick turn back into a human! 🚀&lt;/p&gt;




&lt;h2&gt;
  
  
  ✅ Task 1 — Find the First Ingredient
&lt;/h2&gt;




&lt;h3&gt;
  
  
  🔍 Step 1 — Run an Nmap Scan
&lt;/h3&gt;

&lt;p&gt;The first step in any CTF is &lt;strong&gt;reconnaissance&lt;/strong&gt;, so I started with &lt;strong&gt;Nmap&lt;/strong&gt;, one of the most powerful network scanning tools for ethical hackers and penetration testers.&lt;/p&gt;

&lt;p&gt;I used the &lt;strong&gt;aggressive scan&lt;/strong&gt; (&lt;code&gt;-A&lt;/code&gt; flag), which does multiple things at once:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Runs &lt;strong&gt;OS detection&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Detects &lt;strong&gt;service versions&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Runs &lt;strong&gt;default NSE scripts&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Performs a &lt;strong&gt;traceroute&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This helps find &lt;strong&gt;open ports&lt;/strong&gt;, see &lt;strong&gt;which services&lt;/strong&gt; are running, and gather useful information for the next steps.&lt;/p&gt;

&lt;p&gt;Here’s the command I ran:sudo nmap -A 10.10.127.154&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyoqucr9x9m7h2il7iy5e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyoqucr9x9m7h2il7iy5e.png" alt=" " width="800" height="320"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  🔍 Step 2 — Discover Hidden Directories with Gobuster
&lt;/h3&gt;

&lt;p&gt;After finding the open &lt;strong&gt;HTTP port&lt;/strong&gt;, I visited the website in my browser:&lt;br&gt;
&lt;a href="http://10.10.127.154/" rel="noopener noreferrer"&gt;http://10.10.127.154/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F778uuoc5ax4g06clunsd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F778uuoc5ax4g06clunsd.png" alt=" " width="800" height="378"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The homepage didn’t show much, but when I checked the &lt;strong&gt;page source&lt;/strong&gt;, I found a comment with a &lt;strong&gt;username&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;
&lt;code&gt;R1ckRul3s&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwzz7lzfg80zcytsdfb2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwzz7lzfg80zcytsdfb2.png" alt=" " width="800" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To find more hidden files or directories, I used &lt;strong&gt;Gobuster&lt;/strong&gt;, a fast directory brute-forcing tool.&lt;br&gt;&lt;br&gt;
Gobuster checks common paths on the web server that might not be linked anywhere.&lt;/p&gt;

&lt;p&gt;Here’s the basic Gobuster command I ran: gobuster dir -u &lt;a href="http://10.10.127.154/" rel="noopener noreferrer"&gt;http://10.10.127.154/&lt;/a&gt; -w /usr/share/wordlists/dirb/common.txt&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fopovug685se7oydtohwv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fopovug685se7oydtohwv.png" alt=" " width="800" height="318"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;✅ Result:&lt;br&gt;
Gobuster found a robots.txt file. So, I visited it in the browser and found this string:&lt;br&gt;
Wubbalubbadubdub&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3p34m0sy297jk8swuucz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3p34m0sy297jk8swuucz.png" alt=" " width="800" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I used this as the password, combined with the username from the source code.&lt;/p&gt;

&lt;p&gt;Next, I looked for a login page.&lt;/p&gt;

&lt;p&gt;To find possible login pages, I ran Gobuster again with common extensions:&lt;/p&gt;

&lt;p&gt;gobuster dir -u &lt;a href="http://10.10.127.154/" rel="noopener noreferrer"&gt;http://10.10.127.154/&lt;/a&gt; -w /usr/share/wordlists/dirb/common.txt -x php,txt,bak&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft7y8k70jryyuadfu2xi3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft7y8k70jryyuadfu2xi3.png" alt=" " width="800" height="336"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8l3vn5819hn9y9iyy5dj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8l3vn5819hn9y9iyy5dj.png" alt=" " width="800" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  🔍 Step 3 — Login to the Portal &amp;amp; Explore
&lt;/h3&gt;

&lt;p&gt;After finding the &lt;strong&gt;username&lt;/strong&gt; (&lt;code&gt;R1ckRul3s&lt;/code&gt;) and &lt;strong&gt;password&lt;/strong&gt; (&lt;code&gt;Wubbalubbadubdub&lt;/code&gt;), I looked for a &lt;strong&gt;login page&lt;/strong&gt;.&lt;br&gt;&lt;br&gt;
Thanks to the Gobuster results, I found one at:&lt;br&gt;
&lt;a href="http://10.10.127.154/login.php" rel="noopener noreferrer"&gt;http://10.10.127.154/login.php&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzukzgz2cqnj5wr65gick.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzukzgz2cqnj5wr65gick.png" alt=" " width="800" height="361"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I entered the credentials:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Username:&lt;/strong&gt; R1ckRul3s
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Password:&lt;/strong&gt; Wubbalubbadubdub&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;✅ &lt;strong&gt;Login successful!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once logged in, I checked if I could run commands through the portal.&lt;br&gt;&lt;br&gt;
I used simple Linux commands to explore:  ls&lt;/p&gt;

&lt;p&gt;This listed the files in the current directory.&lt;br&gt;
I saw some interesting files, including: Sup3rS3cretPickl3Ingred.txt, clue.txt&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj2uh0y096m6rwflhpvso.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj2uh0y096m6rwflhpvso.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I tried to read it with cat&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbn12x1h9r2utvm2ml84i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbn12x1h9r2utvm2ml84i.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So cat was disabled!&lt;/p&gt;

&lt;p&gt;I bypassed this by using the strings command instead:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5jr5k3cqu4dtmo3bnl5t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5jr5k3cqu4dtmo3bnl5t.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This worked and revealed the first ingredient for Pickle Rick!&lt;/p&gt;

&lt;h2&gt;
  
  
  🧩 Task 2 — Find the Second Ingredient
&lt;/h2&gt;




&lt;h1&gt;
  
  
  ✅ Step 1 — Read the Clue
&lt;/h1&gt;

&lt;p&gt;After getting the first ingredient, I found a file named &lt;code&gt;clue.txt&lt;/code&gt;.&lt;br&gt;&lt;br&gt;
I used the &lt;code&gt;strings&lt;/code&gt; command to read it:&lt;br&gt;
&lt;strong&gt;strings clue.txt&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2telqrvbd3czul1wtlo0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2telqrvbd3czul1wtlo0.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Step 2 — Check the /home Directory
&lt;/h1&gt;

&lt;p&gt;User files are usually inside /home, so I listed its contents:&lt;br&gt;
&lt;strong&gt;ls /home&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0o3kglwtaatkeomvffat.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0o3kglwtaatkeomvffat.png" alt=" " width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I found two user directories: rick ,ubuntu&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Step 3 — Check Rick’s Directory
&lt;/h1&gt;

&lt;p&gt;Since this is Rick’s lab, I checked his folder:&lt;br&gt;
&lt;strong&gt;ls /home/rick&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I saw a file that looked important: &lt;strong&gt;second ingredients&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Step 4 — Read the Second Ingredient
&lt;/h1&gt;

&lt;p&gt;I used the strings command again to read the file:&lt;br&gt;
&lt;strong&gt;strings /home/rick/second\ ingredients&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkaux1ckr4j018jlv3yr8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkaux1ckr4j018jlv3yr8.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Success!
&lt;/h1&gt;

&lt;p&gt;This gave me the second ingredient for Rick’s potion.&lt;/p&gt;

&lt;h2&gt;
  
  
  🧩 Task 3 — Find the Third Ingredient
&lt;/h2&gt;




&lt;h1&gt;
  
  
  ✅ Step 1 — Check Current User
&lt;/h1&gt;

&lt;p&gt;To find out which user I was running as, I used:&lt;br&gt;
&lt;strong&gt;whoami&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz47v6aqb2uc65qkufw07.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz47v6aqb2uc65qkufw07.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This means I was the web server user, which sometimes has limited permissions — but might still have sudo access.&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Step 2 — Try Accessing /root
&lt;/h1&gt;

&lt;p&gt;Since some final clues often hide in the root folder, I checked if I could list its files using sudo:&lt;br&gt;
&lt;strong&gt;sudo ls /root&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzmd3dp5dseajb2i3c4di.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzmd3dp5dseajb2i3c4di.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I found a file named: &lt;strong&gt;3rd.txt&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Step 3 — Read the Third Ingredient
&lt;/h1&gt;

&lt;p&gt;Finally, I used strings to read the file&lt;br&gt;
&lt;strong&gt;sudo strings /root/3rd.txt&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft28w478j75ha3ra2vyw7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft28w478j75ha3ra2vyw7.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;✅ This gave me the third and final ingredient for Rick’s potion!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgqwwnh54bd4zqhxhbm4u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgqwwnh54bd4zqhxhbm4u.png" alt=" " width="800" height="380"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🎉 Conclusion
&lt;/h2&gt;




&lt;p&gt;In this TryHackMe room, &lt;strong&gt;Pickle Rick&lt;/strong&gt;, I practiced basic &lt;strong&gt;web enumeration&lt;/strong&gt;, &lt;strong&gt;directory brute-forcing&lt;/strong&gt;, and simple &lt;strong&gt;Linux privilege exploration&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Here’s a quick recap:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🔍 &lt;strong&gt;Task 1:&lt;/strong&gt; Scanned the target with &lt;code&gt;nmap&lt;/code&gt;, found open ports and credentials hidden in &lt;code&gt;robots.txt&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;🗂️ &lt;strong&gt;Task 2:&lt;/strong&gt; Used a clue to navigate the file system and found the &lt;strong&gt;second ingredient&lt;/strong&gt; inside Rick’s home folder.&lt;/li&gt;
&lt;li&gt;🔑 &lt;strong&gt;Task 3:&lt;/strong&gt; Checked my privileges as &lt;code&gt;www-data&lt;/code&gt; and leveraged &lt;code&gt;sudo&lt;/code&gt; to read the &lt;strong&gt;third ingredient&lt;/strong&gt; from &lt;code&gt;/root&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This room is perfect for beginners learning:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Basic recon with &lt;code&gt;nmap&lt;/code&gt; and &lt;code&gt;gobuster&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;How to inspect source code and hidden files&lt;/li&gt;
&lt;li&gt;Simple Linux enumeration and privilege usage&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;✅ &lt;strong&gt;If you found this helpful, please leave a ❤️ like and drop a comment below!&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Your feedback helps my write-ups reach more beginners and keeps me motivated to share more walkthroughs. 🚀&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thanks for reading — follow for more TryHackMe, CTF, and hacking tutorials!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Happy hacking! 🥒💚&lt;/p&gt;

</description>
      <category>tryhackme</category>
      <category>ctf</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>[Boost]</title>
      <dc:creator>Lucky Defaulter</dc:creator>
      <pubDate>Thu, 10 Jul 2025 04:18:12 +0000</pubDate>
      <link>https://dev.to/lucky-cyber3008/-170g</link>
      <guid>https://dev.to/lucky-cyber3008/-170g</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/lucky-cyber3008/-wireshark-the-basics-tryhackme-walkthrough-1546" class="crayons-story__hidden-navigation-link"&gt;“Wireshark for Beginners: TryHackMe Walkthrough &amp;amp; Tips”&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/lucky-cyber3008" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3337581%2F6b19935f-ee0f-4c67-b887-8dc5e3657087.png" alt="lucky-cyber3008 profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/lucky-cyber3008" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Lucky Defaulter
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Lucky Defaulter
                
              
              &lt;div id="story-author-preview-content-2670893" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/lucky-cyber3008" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3337581%2F6b19935f-ee0f-4c67-b887-8dc5e3657087.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Lucky Defaulter&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/lucky-cyber3008/-wireshark-the-basics-tryhackme-walkthrough-1546" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Jul 9 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/lucky-cyber3008/-wireshark-the-basics-tryhackme-walkthrough-1546" id="article-link-2670893"&gt;
          “Wireshark for Beginners: TryHackMe Walkthrough &amp;amp; Tips”
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/cybersecurity"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;cybersecurity&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/wireshark"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;wireshark&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/tryhackme"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;tryhackme&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/tutorial"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;tutorial&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
            &lt;a href="https://dev.to/lucky-cyber3008/-wireshark-the-basics-tryhackme-walkthrough-1546#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            5 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>cybersecurity</category>
      <category>wireshark</category>
      <category>tryhackme</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>“Wireshark for Beginners: TryHackMe Walkthrough &amp; Tips”</title>
      <dc:creator>Lucky Defaulter</dc:creator>
      <pubDate>Wed, 09 Jul 2025 07:55:47 +0000</pubDate>
      <link>https://dev.to/lucky-cyber3008/-wireshark-the-basics-tryhackme-walkthrough-1546</link>
      <guid>https://dev.to/lucky-cyber3008/-wireshark-the-basics-tryhackme-walkthrough-1546</guid>
      <description>&lt;p&gt;👋 Hello everyone!&lt;br&gt;&lt;br&gt;
This is my detailed walkthrough for the &lt;strong&gt;Wireshark: The Basics&lt;/strong&gt; room on &lt;a href="https://tryhackme.com/room/wiresharkthebasics" rel="noopener noreferrer"&gt;TryHackMe&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  ✅ Task 1 — Introduction
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;What I Learned:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Wireshark is an open-source network packet analyzer.&lt;/li&gt;
&lt;li&gt;The room provides a VM with two &lt;code&gt;.pcapng&lt;/code&gt; files.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6omquedb6pbr4ur4w2mf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6omquedb6pbr4ur4w2mf.png" alt=" " width="800" height="596"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Task 2 — Use Cases, GUI &amp;amp; File Analysis
&lt;/h1&gt;

&lt;h2&gt;
  
  
  📂 File Used
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Exercise.pcapng&lt;/code&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🔍 1️⃣ Find the Capture File Comments (Flag)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Opened &lt;code&gt;Exercise.pcapng&lt;/code&gt; in Wireshark.&lt;/li&gt;
&lt;li&gt;Went to &lt;code&gt;Statistics&lt;/code&gt; → &lt;code&gt;Capture File Properties&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;A pop-up box appeared showing the file metadata.&lt;/li&gt;
&lt;li&gt;Scrolled down to find the &lt;strong&gt;Capture File Comments&lt;/strong&gt; section.&lt;/li&gt;
&lt;li&gt;Found the hidden flag inside the comments.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2js4z0l0pss4l909ybjg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2js4z0l0pss4l909ybjg.png" alt=" " width="800" height="357"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0aai2w41gjazkhhf4wwj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0aai2w41gjazkhhf4wwj.png" alt=" " width="800" height="525"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  📊 2️⃣ Find the Total Number of Packets
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;While the file was still open:

&lt;ul&gt;
&lt;li&gt;Looked at the bottom right corner in the &lt;strong&gt;Status Bar&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Found the &lt;strong&gt;Total Packets&lt;/strong&gt; count there.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr09i2c5ylra075ytpbw7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr09i2c5ylra075ytpbw7.png" alt=" " width="800" height="132"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🔐 3️⃣ Find the SHA256 Hash Value
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Again, went to &lt;code&gt;Statistics&lt;/code&gt; → &lt;code&gt;Capture File Properties&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;At the top of the pop-up, found the &lt;strong&gt;SHA256 hash&lt;/strong&gt; of the capture file.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F481kg4h2atoskkp1vtrb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F481kg4h2atoskkp1vtrb.png" alt=" " width="800" height="215"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Task 3 — Packet Dissection
&lt;/h1&gt;

&lt;h2&gt;
  
  
  📂 File Used
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Exercise.pcapng&lt;/code&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🔍 What I Did
&lt;/h2&gt;

&lt;p&gt;In this task, I practiced &lt;strong&gt;packet dissection&lt;/strong&gt; by decoding protocol layers in &lt;strong&gt;Packet 38&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  ⚙️ Steps I Followed
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1️⃣ Markup Language (HTTP)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;I located &lt;strong&gt;Packet 38&lt;/strong&gt; in the Packet List Pane.&lt;/li&gt;
&lt;li&gt;Below, in the &lt;strong&gt;Packet Details Pane&lt;/strong&gt;, I checked the layers.&lt;/li&gt;
&lt;li&gt;I expanded the &lt;strong&gt;HTTP protocol layer&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Found the markup language directly under &lt;strong&gt;HTTP&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhps0c5clf9ke2pmsbidn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhps0c5clf9ke2pmsbidn.png" alt=" " width="800" height="346"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  2️⃣ Arrival Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While still in &lt;strong&gt;Packet 38&lt;/strong&gt;, I expanded the &lt;strong&gt;HTTP protocol&lt;/strong&gt; section.&lt;/li&gt;
&lt;li&gt;Found the &lt;strong&gt;Arrival Date&lt;/strong&gt; field in the headers/info.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhpifg97i9d6oltv7olta.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhpifg97i9d6oltv7olta.png" alt=" " width="800" height="355"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3️⃣ TTL Value
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In the &lt;strong&gt;Packet Details Pane&lt;/strong&gt;, I expanded the &lt;strong&gt;IP protocol&lt;/strong&gt; section.&lt;/li&gt;
&lt;li&gt;Found the &lt;strong&gt;TTL (Time to Live)&lt;/strong&gt; field listed inside.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsya3mickjajomhv8gz75.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsya3mickjajomhv8gz75.png" alt=" " width="800" height="133"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  4️⃣ TCP Payload Size
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Just below the &lt;strong&gt;IP protocol&lt;/strong&gt;, there’s the &lt;strong&gt;TCP protocol&lt;/strong&gt; section.&lt;/li&gt;
&lt;li&gt;Without expanding, the &lt;strong&gt;Payload Size&lt;/strong&gt; was already visible in the same line at the end.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7lyd1s17zl0yz49yi4vx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7lyd1s17zl0yz49yi4vx.png" alt=" " width="800" height="81"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  5️⃣ E-Tag Value
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Again, under the same &lt;strong&gt;HTTP protocol&lt;/strong&gt; section, I looked deeper.&lt;/li&gt;
&lt;li&gt;Found the &lt;strong&gt;E-Tag&lt;/strong&gt; field and noted its value.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3xkjljnsua7tbq2u5dtf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3xkjljnsua7tbq2u5dtf.png" alt=" " width="800" height="118"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Task 4 — Packet Navigation
&lt;/h1&gt;

&lt;h2&gt;
  
  
  📂 File Used
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Exercise.pcapng&lt;/code&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🔍 What I Did
&lt;/h2&gt;

&lt;p&gt;In this task, I learned to &lt;strong&gt;search&lt;/strong&gt;, &lt;strong&gt;navigate&lt;/strong&gt;, &lt;strong&gt;mark&lt;/strong&gt;, &lt;strong&gt;comment&lt;/strong&gt;, &lt;strong&gt;extract&lt;/strong&gt;, and &lt;strong&gt;verify packets&lt;/strong&gt; using Wireshark’s advanced features.&lt;/p&gt;




&lt;h2&gt;
  
  
  ⚙️ Steps I Followed
&lt;/h2&gt;




&lt;h3&gt;
  
  
  1️⃣ Search for &lt;code&gt;r4w&lt;/code&gt; String — Artist 1
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Opened &lt;code&gt;Exercise.pcapng&lt;/code&gt; in Wireshark.&lt;/li&gt;
&lt;li&gt;Went to &lt;code&gt;Edit&lt;/code&gt; → &lt;code&gt;Find Packet&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;In the &lt;strong&gt;Find Packet&lt;/strong&gt; dialog:

&lt;ul&gt;
&lt;li&gt;Entered &lt;strong&gt;r4w&lt;/strong&gt; as the search string.&lt;/li&gt;
&lt;li&gt;Set the search to look inside &lt;strong&gt;Packet Details&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Wireshark highlighted the packet containing &lt;code&gt;r4w&lt;/code&gt; → found the full string → revealed &lt;strong&gt;Artist 1’s name&lt;/strong&gt;.&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsmp4lsflx36mpo5r29j6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsmp4lsflx36mpo5r29j6.png" alt=" " width="800" height="341"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqwsqcou92h10yfr8hht9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqwsqcou92h10yfr8hht9.png" alt=" " width="800" height="319"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  2️⃣ Get MD5 Hash — Packet Comments
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Went to &lt;code&gt;Go&lt;/code&gt; → &lt;code&gt;Go to Packet&lt;/code&gt; → Entered &lt;strong&gt;12&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Right-clicked the packet → selected &lt;strong&gt;Packet Comment&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;The comment said: &lt;strong&gt;Go to Packet 39765&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Went to &lt;code&gt;Go&lt;/code&gt; → &lt;code&gt;Go to Packet&lt;/code&gt; → Entered &lt;strong&gt;39765&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Exported the packet bytes:

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;File&lt;/code&gt; → &lt;code&gt;Export Packet Bytes&lt;/code&gt; → saved as &lt;strong&gt;test&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Opened terminal → ran:
md5sum test&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fudi0sxn1ou3qj40ehowd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fudi0sxn1ou3qj40ehowd.png" alt=" " width="800" height="294"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fis0jsbzru18joqkdfvq9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fis0jsbzru18joqkdfvq9.png" alt=" " width="800" height="227"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzno27umm46a5paw17s4b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzno27umm46a5paw17s4b.png" alt=" " width="683" height="437"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8qkkl6ogn73ji0iguuge.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8qkkl6ogn73ji0iguuge.png" alt=" " width="431" height="121"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3️⃣ Extract &lt;code&gt;.txt&lt;/code&gt; File — Find the Alien’s Name
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Opened &lt;strong&gt;Exercise.pcapng&lt;/strong&gt; in Wireshark.&lt;/li&gt;
&lt;li&gt;Clicked &lt;code&gt;File&lt;/code&gt; → &lt;code&gt;Export Objects&lt;/code&gt; → &lt;code&gt;HTTP&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;A window popped up listing all HTTP objects:

&lt;ul&gt;
&lt;li&gt;Columns: Filename, Size, Packet, Host, Content Type.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Sorted the &lt;strong&gt;Filename&lt;/strong&gt; column by clicking the &lt;strong&gt;up arrow&lt;/strong&gt;.&lt;/li&gt;

&lt;li&gt;Located &lt;strong&gt;note.txt&lt;/strong&gt; in the list.&lt;/li&gt;

&lt;li&gt;Selected &lt;strong&gt;note.txt&lt;/strong&gt; and saved it to my &lt;strong&gt;Downloads&lt;/strong&gt; folder.&lt;/li&gt;

&lt;li&gt;Opened my terminal and ran: cat note.txt&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjfpvagt7733q7cjb5pik.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjfpvagt7733q7cjb5pik.png" alt=" " width="800" height="355"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4jwkguygxbjnjevkd30.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4jwkguygxbjnjevkd30.png" alt=" " width="800" height="362"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzmfhkxuqji3gl03nx6k9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzmfhkxuqji3gl03nx6k9.png" alt=" " width="800" height="482"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsazqoabu0u6fyu43xkm8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsazqoabu0u6fyu43xkm8.png" alt=" " width="800" height="353"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🔍 4️⃣ Check Expert Info — Find Number of Warnings
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Opened &lt;code&gt;Exercise.pcapng&lt;/code&gt; in Wireshark.&lt;/li&gt;
&lt;li&gt;Went to &lt;strong&gt;Analyze → Expert Information&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;This opened the &lt;strong&gt;Expert Info&lt;/strong&gt; dialog box.&lt;/li&gt;
&lt;li&gt;The dialog showed various categories: &lt;strong&gt;Chat&lt;/strong&gt;, &lt;strong&gt;Note&lt;/strong&gt;, &lt;strong&gt;Warn&lt;/strong&gt;, and &lt;strong&gt;Error&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Looked for the &lt;strong&gt;Warnings&lt;/strong&gt; section (yellow icon).&lt;/li&gt;
&lt;li&gt;Checked the &lt;strong&gt;Count&lt;/strong&gt; column next to &lt;strong&gt;Warnings&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Got the &lt;strong&gt;total number of warnings&lt;/strong&gt; from there.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9rvhv1ors5puo5hc0rew.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9rvhv1ors5puo5hc0rew.png" alt=" " width="800" height="349"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fibr9174gj6n4zgks82u9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fibr9174gj6n4zgks82u9.png" alt=" " width="800" height="191"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Task 5 — Packet Filtering
&lt;/h1&gt;

&lt;h2&gt;
  
  
  📂 File Used
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Exercise.pcapng&lt;/code&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🔍 1️⃣ Apply Filter — Get Filter Query
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Went to &lt;strong&gt;Packet 4&lt;/strong&gt; in the capture.&lt;/li&gt;
&lt;li&gt;In the &lt;strong&gt;Packet Details Pane&lt;/strong&gt; below, found the &lt;strong&gt;HTTP protocol&lt;/strong&gt; layer.&lt;/li&gt;
&lt;li&gt;Right-clicked on the &lt;strong&gt;HTTP protocol&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Chose &lt;strong&gt;Apply as Filter → Selected&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;The filter was applied automatically.&lt;/li&gt;
&lt;li&gt;The filter query appeared in the &lt;strong&gt;Filter Bar&lt;/strong&gt; at the top.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhlcl9c07lf8z1rcjt5rl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhlcl9c07lf8z1rcjt5rl.png" alt=" " width="800" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhto4nu4oaem5pe8v1xs0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhto4nu4oaem5pe8v1xs0.png" alt=" " width="800" height="51"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🔍 2️⃣ Displayed Packets Count
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;After the filter was applied:

&lt;ul&gt;
&lt;li&gt;Looked at the &lt;strong&gt;Status Bar&lt;/strong&gt; in the bottom right corner.&lt;/li&gt;
&lt;li&gt;Verified the &lt;strong&gt;number of packets displayed&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Used this number as the answer.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj3k2ztpbzehj2th6wlev.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj3k2ztpbzehj2th6wlev.png" alt=" " width="800" height="195"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🔍 3️⃣ Follow HTTP Stream — Total Number of Artists
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Went to &lt;strong&gt;Packet 33790&lt;/strong&gt; in the capture.&lt;/li&gt;
&lt;li&gt;Right-clicked the packet.&lt;/li&gt;
&lt;li&gt;Selected &lt;strong&gt;Follow → HTTP Stream&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;A new window opened showing the &lt;strong&gt;HTTP response&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Searched for &lt;strong&gt;artist&lt;/strong&gt; in the source code.&lt;/li&gt;
&lt;li&gt;Counted the total number of &lt;strong&gt;artists&lt;/strong&gt; listed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg83yw0pg29vrw31y7ycq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg83yw0pg29vrw31y7ycq.png" alt=" " width="800" height="359"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fulv6yxbw7wka65ugmx9i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fulv6yxbw7wka65ugmx9i.png" alt=" " width="800" height="414"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F691jrnily490sfesqv99.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F691jrnily490sfesqv99.png" alt=" " width="800" height="516"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🔍 4️⃣ Name of Second Artist
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;In the &lt;strong&gt;same HTTP Stream window&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Checked the displayed list of all artists.&lt;/li&gt;
&lt;li&gt;Found and noted the &lt;strong&gt;name of the second artist&lt;/strong&gt; in the list.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiu9oqe0kacmaow6sqm6n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiu9oqe0kacmaow6sqm6n.png" alt=" " width="800" height="516"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ✅ Task 6 — Conclusion
&lt;/h1&gt;




&lt;h2&gt;
  
  
  🎉 What I Learned
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;How to open and navigate &lt;code&gt;.pcapng&lt;/code&gt; files in Wireshark.&lt;/li&gt;
&lt;li&gt;How to use &lt;strong&gt;Capture File Properties&lt;/strong&gt; to find metadata like flags and hashes.&lt;/li&gt;
&lt;li&gt;How to dissect packets layer by layer using the &lt;strong&gt;Packet Details Pane&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;How to apply filters, follow streams, and extract files from packets.&lt;/li&gt;
&lt;li&gt;How to use Expert Info, Mark Packets, and Packet Comments for deeper analysis.&lt;/li&gt;
&lt;li&gt;How to search with &lt;strong&gt;Find Packet&lt;/strong&gt;, navigate with &lt;strong&gt;Go To Packet&lt;/strong&gt;, and export objects.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7xcy4guuxd7z4gu4owgw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7xcy4guuxd7z4gu4owgw.png" alt=" " width="800" height="373"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  🙌 Thanks for Reading!
&lt;/h2&gt;




&lt;p&gt;🙏 &lt;strong&gt;If this helped you, please ❤️ this post, leave a comment, and share it with your friends!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;💬 I’d love to hear: Did you find this TryHackMe room useful? Drop your thoughts below!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;💻 &lt;a href="https://tryhackme.com/p/DefaulterLucky" rel="noopener noreferrer"&gt;TryHackMe Profile&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;🐙 &lt;a href="https://github.com/lucky-cyber3008" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Happy Packet Sniffing! 🦈✨&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>wireshark</category>
      <category>tryhackme</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
