53fd30619d | ||
---|---|---|
.. | ||
Base64.png | ||
HTTP.png | ||
README.md | ||
flag (4) |
README.md
A CAPture of a Flag
The main idea finding the flag is exploring the given PCAP file in Wireshark.
Step-1:
After downloading flag (4)
(a PCAP file) from the cloud, I directly opened it in Wireshark application.
For those, who are unaware om how to filter streams or use this application, please do your homework here:
Step-2:
I tried to check TCP stream for some clues and then I tried UDP streams for some clues. Finally, I used the filter to get only HTTP requests.
Step-3:
I went through all requests and this request caught my eye.
247 2.270670 10.50.203.75 185.21.216.190 HTTP 504 GET /?msg=ZmxhZ3tBRmxhZ0luUENBUH0= HTTP/1.1
It has a Base64 encrypted message.
Step-4:
So finally, I decoded it online at: https://www.base64decode.org/
I got the flag there:
Voila, we have it here.
Step-4:
Finally the flag becomes:
flag{AFlagInPCAP}