diff --git a/Gemfile b/Gemfile
index bc9ba0183..df606e27e 100644
--- a/Gemfile
+++ b/Gemfile
@@ -33,6 +33,7 @@ gem 'ruby-graphviz'
gem 'rsa'
gem 'gpgmeh'
gem 'digest-sha3', :git => "http://github.com/izetex/digest-sha3-ruby"
+gem 'packetfu'
#development only gems go here
group :test, :development do
diff --git a/Gemfile.lock b/Gemfile.lock
index 214c26f37..1d2fd36da 100644
--- a/Gemfile.lock
+++ b/Gemfile.lock
@@ -91,6 +91,9 @@ GEM
nori (2.6.0)
ovirt-engine-sdk (4.2.4)
json (>= 1, < 3)
+ packetfu (1.1.11)
+ pcaprub (~> 0.12)
+ pcaprub (0.12.4)
pg (1.1.3)
process_helper (0.1.2)
puppet (6.0.0)
@@ -162,6 +165,7 @@ DEPENDENCIES
nokogiri
nori
ovirt-engine-sdk
+ packetfu
pg
process_helper
programr!
diff --git a/modules/vulnerabilities/unix/ctf/pcap_file/secgen_metadata.xml b/modules/vulnerabilities/unix/ctf/pcap_file/secgen_metadata.xml
index c4b9243d1..1ea1a9e5a 100644
--- a/modules/vulnerabilities/unix/ctf/pcap_file/secgen_metadata.xml
+++ b/modules/vulnerabilities/unix/ctf/pcap_file/secgen_metadata.xml
@@ -6,7 +6,9 @@
pcap fileJason ZellerMIT
- Release a pcap file with a flag generated somewhere.
+ Release a pcap file with a flag, into storage_directory.
+ Can specify an account file is owned by or defaults to root.
+ pcapsystem
diff --git a/modules/vulnerabilities/unix/ctf/zip_file/secgen_metadata.xml b/modules/vulnerabilities/unix/ctf/zip_file/secgen_metadata.xml
index 19aecc24b..aab093d2b 100644
--- a/modules/vulnerabilities/unix/ctf/zip_file/secgen_metadata.xml
+++ b/modules/vulnerabilities/unix/ctf/zip_file/secgen_metadata.xml
@@ -6,7 +6,9 @@
Zip FileJason ZellerMIT
- Release a zip file with a flag. Password optional.
+ Release a zip file with a flag. Password optional.
+ Can specify an account file is owned by or defaults to root.
+ zip_filesystem
diff --git a/scenarios/examples/vulnerability_examples/ctf_module_examples/pcap_file.xml b/scenarios/examples/vulnerability_examples/ctf_module_examples/pcap_file.xml
new file mode 100644
index 000000000..a37752f67
--- /dev/null
+++ b/scenarios/examples/vulnerability_examples/ctf_module_examples/pcap_file.xml
@@ -0,0 +1,43 @@
+
+
+
+
+ pcap_file Example
+ Jason Zeller
+
+
+ This scenario demonstrates leaking a pcap file with a flag embedded and cleartext.
+
+
+ ctf
+ easy
+
+
+ server
+
+
+
+
+
+
+
+
+
+ ******SECRET*******From now on, make sure that all network traffic is properly encrypted.******SECRET******
+
+
+
+
+
+ capture.pcap
+
+
+ /var/log
+
+
+
+
+
+
diff --git a/scenarios/examples/vulnerability_examples/ctf_module_examples/zip_file.xml b/scenarios/examples/vulnerability_examples/ctf_module_examples/zip_file.xml
new file mode 100644
index 000000000..6447b17dd
--- /dev/null
+++ b/scenarios/examples/vulnerability_examples/ctf_module_examples/zip_file.xml
@@ -0,0 +1,50 @@
+
+
+
+
+ zip_file Example
+ Jason Zeller
+
+
+ This scenario demonstrates leaking a zip file with a flag embedded and zip can be password protected.
+
+
+ ctf
+ easy
+
+
+ server
+
+
+
+
+
+
+
+
+
+ jtrpassword.lst
+
+
+
+
+
+
+ Congratulations you have cracked our protected zip file. We wish there was more information here but we are just not that smart. Here is a flag for your troubles.
+
+
+
+
+
+ protected.zip
+
+
+ /var/log
+
+
+
+
+
+