How To: Extract Windows executables from packet captures

Extract Windows executables from packet captures

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to extract Windows executables from packet captures.

Eighty of Dual Core comes down to the HakHouse to share with us a technique for extracting Windows executables from packet captures. Darren's featuring some of the Gmail badge submissions and a walkthrough of the Easter Egg hunt. Plus be sure to stick around as Eighty treats us to a live performance off his upcoming album.

While Matt's away on business Eighty of Dual Core fills in with an awesome segment on extracting Windows executables from packet captures using tcpxtract.

Darren's features some of the Gmail Badges from our recent Code Challenge.

Plus we've got a walk-through on winning the Easter Egg Hunt. Only *four* of over 300 submissions completed the puzzle. We've learned a bunch of lessons from this first hunt and will be sure to put together an even more in-depth hunt next time

Search Hak5 on WonderHowTo for more tech episodes from this Revision3 show.

Just updated your iPhone to iOS 18? You'll find a ton of hot new features for some of your most-used Apple apps. Dive in and see for yourself:

Be the First to Comment

Share Your Thoughts

  • Hot
  • Latest