<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Easy on Policy to Packets</title>
    <link>https://www.policytopackets.com/tags/easy/</link>
    <description>Recent content in Easy on Policy to Packets</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>reedveggleston@gmail.com (Reed Eggleston)</managingEditor>
    <webMaster>reedveggleston@gmail.com (Reed Eggleston)</webMaster>
    <copyright>© 2026 Reed Eggleston</copyright>
    <lastBuildDate>Mon, 09 Mar 2026 18:29:00 +0000</lastBuildDate><atom:link href="https://www.policytopackets.com/tags/easy/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>(Writeup) HackTheBox Labs - Machine - Expressway</title>
      <link>https://www.policytopackets.com/writeups/hackthebox/machines/expressway/</link>
      <pubDate>Mon, 09 Mar 2026 18:29:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/hackthebox/machines/expressway/</guid>
      <description>Easy Linux Box. Exploiting IKE Aggressive Mode to capture and crack a VPN PSK hash, then abusing a sudo CVE for root.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Disclose The Agent</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/disclose_the_agent/</link>
      <pubDate>Mon, 23 Feb 2026 15:48:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/disclose_the_agent/</guid>
      <description>Analyzing an SMTP PCAP to identify leaked credentials, decode Base64 authentication data, extract and reconstruct an email attachment from network traffic, and verify file integrity through hashing.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Investigate Web Attack</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/investigate_web_attack/</link>
      <pubDate>Mon, 23 Feb 2026 12:14:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/investigate_web_attack/</guid>
      <description>Analyzing raw Apache access logs with Bash tools to identify reconnaissance with Nikto, forced browsing, successful login brute force activity, and command injection leading to account creation on the target system.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Http Basic Auth.</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/http_basic_auth./</link>
      <pubDate>Mon, 23 Feb 2026 11:41:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/http_basic_auth./</guid>
      <description>Analyzing a PCAP file to identify HTTP GET requests, enumerate server and client details from HTTP headers, and decode Basic Authentication credentials using Wireshark and CyberChef.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Shellshock Attack</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/shellshock_attack/</link>
      <pubDate>Sat, 14 Feb 2026 22:48:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/shellshock_attack/</guid>
      <description>Analyzing Shellshock attack activity in a PCAP file using Wireshark, identifying the target server details and the injected command.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Port Scan Activity</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/port_scan_activity/</link>
      <pubDate>Sat, 14 Feb 2026 22:10:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/port_scan_activity/</guid>
      <description>Analyzing port scan activity in a PCAP file using Wireshark, identifying the scanning host, discovered systems, and network indicators.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Malicious Doc</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/malicious_doc/</link>
      <pubDate>Sat, 14 Feb 2026 00:15:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/malicious_doc/</guid>
      <description>Analyzing a malicious Word document using VirusTotal to identify RTF exploit behavior, CVE-2017-11882 abuse, payload delivery, and network communication.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Remote Working</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/remote_working/</link>
      <pubDate>Fri, 13 Feb 2026 23:08:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/remote_working/</guid>
      <description>Analyzing a malicious XLS file using VirusTotal to identify detection signatures, dropped files, spyware download URLs, and file intelligence indicators.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Malicious VBA</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/malicious_vba/</link>
      <pubDate>Fri, 13 Feb 2026 16:41:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/malicious_vba/</guid>
      <description>Analyzing a malicious VBA macro document, decoding obfuscated hex strings, identifying payload delivery, and investigating HTTP communication and WMI execution techniques.</description>
      
    </item>
    
    <item>
      <title>(Writeup) HackTheBox Labs - Challenge - Slippy</title>
      <link>https://www.policytopackets.com/writeups/hackthebox/challenges/slippy/</link>
      <pubDate>Thu, 12 Feb 2026 21:20:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/hackthebox/challenges/slippy/</guid>
      <description>Demonstrating Zip Slip exploitation, Jinja2 SSTI abuse, and Flask-based web application compromise within a Docker environment.</description>
      
    </item>
    
  </channel>
</rss>
