36 lines
957 B
Markdown
36 lines
957 B
Markdown
|
## A CAPture of a Flag
|
||
|
The main idea finding the flag is exploring the given PCAP file in Wireshark.
|
||
|
|
||
|
#### Step-1:
|
||
|
After downloading `flag (4)` (a PCAP file) from the cloud, I directly opened it in Wireshark application.
|
||
|
|
||
|
For those, who are unaware om how to filter streams or use this application, please do your homework here:
|
||
|
|
||
|
https://www.wireshark.org/
|
||
|
|
||
|
#### Step-2:
|
||
|
|
||
|
I tried to check TCP stream for some clues and then I tried UDP streams for some clues. Finally, I used the filter to get only HTTP requests.
|
||
|
|
||
|
<img src="HTTP.png">
|
||
|
|
||
|
#### Step-3:
|
||
|
|
||
|
I went through all requests and this request caught my eye.
|
||
|
`247 2.270670 10.50.203.75 185.21.216.190 HTTP 504 GET /?msg=ZmxhZ3tBRmxhZ0luUENBUH0= HTTP/1.1 `
|
||
|
|
||
|
It has a Base64 encrypted message.
|
||
|
|
||
|
#### Step-4:
|
||
|
|
||
|
So finally, I decoded it online at: https://www.base64decode.org/
|
||
|
|
||
|
I got the flag there:
|
||
|
|
||
|
<img src="Base64.png">
|
||
|
|
||
|
Voila, we have it here.
|
||
|
|
||
|
#### Step-4:
|
||
|
Finally the flag becomes:
|
||
|
`flag{AFlagInPCAP}`
|