uncertainty sail

Challenge Information

Project: wireshark

Type: delta

Harnesses: 47

Vulnerabilities: 1


GitHubChallenge DownloadChallenge Diff

AFC Challenge Performance

Number of Unique Vulnerabilities Discovered: #

Number of Teams with Scoring PoVs: 1

Number of Teams with Scoring Patches: 1

Number of Teams with Scoring Bundles: 1


Total Points Scored for this Challenge: 9.847560559498058

What design decisions were considered for this challenge?

This challenge was designed around global variable buffer overflows.

Why this set of vulnerabilities?

The vulnerability was chosen due to its detached state. A CRS must be able to keep track of not only individual dissector functionality, but also how global state is affected.

Delta vs Full and why?

This challenge was a delta scan challenge, designed to mimic a developer adding functionality to an existing code base and unintentionally introducing a vulnerability.

Additional Information

Wireshark is a powerful, open-source network protocol analyzer, used to capture and interactively browse the traffic running on a computer network.

Wireshark includes the following features to dissect network traffic:

  • Packet capture and analysis: Captures live traffic from network interfaces and also allows analysis of saved packet capture files (PCAP).
  • Protocol Support: Recognizes and dissects data from hundreds, even thousands, of protocols, including common ones like TCP/IP, HTTP, DNS, and many others.
  • Detailed Inspection: Displays the captured data in a human-readable format, providing a granular view of each packet, including headers, payloads, and other information.
  • Filtering and Search: Offers advanced filters to narrow down the view to specific packets, sessions, or protocols, helping focus the analysis.
  • Cross-platform: Available for Windows, macOS, and Linux.
  • Visualization: Can generate statistics, graphs, and flow diagrams to visualize network activity and performance, potentially revealing anomalies.

Challenge Harnesses

  • handler_lpp
  • handler_wlan_noqos
  • handler_cflow
  • handler_ber
  • handler_dis
  • handler_rnsap
  • handler_netbios
  • handler_its
  • handler_wlan_withfcs
  • handler_zbee_aps
  • handler_x2ap
  • handler_wlan
  • handler_wlan_withoutfcs
  • handler_ngap
  • handler_bat.vis
  • handler_xiri
  • handler_woww
  • handler_asterix
  • handler_e1ap
  • handler_f1ap
  • handler_ngap_media_type
  • handler_telnet
  • handler_json
  • handler_zbee_zdp
  • handler_icmp
  • handler_rrc
  • handler_json_file
  • handler_netflow_tcp
  • handler_wlan_centrino
  • handler_bat.gw
  • handler_s1ap
  • handler_xnap
  • handler_lppe
  • handler_irc
  • handler_nbap
  • handler_gvcp
  • handler_bat
  • handler_e1ap_tcp
  • handler_openvpn.udp
  • handler_netflow
  • handler_hcrt
  • handler_aim
  • handler_lte_rrc.dl_ccch
  • handler_wlan_bsfc
  • handler_icmp_extension
  • handler_openvpn.tcp
  • handler_ansi_map

Challenge Vulnerabilities