Silent Beacon5_B
Network Forensics
100 pts
standard
Challenge Description
Q5 — What HTTP methods are used for beaconing and exfiltration?
Flag format: HackCTF{METHOD1_METHOD2}
Solve this → Q6 unlocks (same file)
Submit Flag
Login to submit a flag.