<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Network-Forensics on Qtnes</title><link>http://qtnes.com/tags/network-forensics/</link><description>Recent content in Network-Forensics on Qtnes</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 17 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="http://qtnes.com/tags/network-forensics/index.xml" rel="self" type="application/rss+xml"/><item><title>7 - The Mole: Reconstructing an Android Malware Beacon from a PCAP</title><link>http://qtnes.com/posts/7---the-mole---reconstructing-an-android-malware-beacon-from-a-pcap/</link><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate><guid>http://qtnes.com/posts/7---the-mole---reconstructing-an-android-malware-beacon-from-a-pcap/</guid><description>&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;p&gt;The Mole was an Android malware challenge built around a single artifact: a PCAP. From that capture alone, the goal was to reconstruct the infection chain, recover the device token, derive the bot token, and finally reach the flag endpoint.&lt;/p&gt;
&lt;p&gt;What made this one interesting is that the network trace already contained the important pivots. The APK was not provided up front, but the traffic exposed enough structure to rebuild the dropper&amp;rsquo;s behavior and the C2 flow.&lt;/p&gt;</description></item></channel></rss>