Points: 200
Tags: picoCTF 2023, Forensics
Author: MUBARAK MIKAIL
Description:
Someone might have hidden the password in the trace file.
Find the key to unlock this file. This tracefile might be good to analyze.
Hints:
1. Download the pcap and look for the password or flag.
2. Don't try to use a password cracking tool, there are easier ways here.
Challenge link: https://play.picoctf.org/practice/challenge/348
Open the PCAP-file in Wireshark and browse through the traffic.
We are looking for a password for the zip-file.
The data in the Ethernet frames contains interesting text for us:
| Protocol | Data |
|---|---|
| 0x6865 | Flying on Ethernet secret: Is this the flag |
| 0x3143 | iBwaWNvQ1RGe1Could the flag have been splitted? |
| 0x4c4b | AABBHHPJGTFRLKVGhpcyBpcyB0aGUgc2VjcmV0OiBwaWNvQ1RGe1IzNERJTkdfTE9LZF8= |
| 0x7361 | PBwaWUvQ1RGesabababkjaASKBKSBACVVAVSDDSSSSDSKJBJS |
| 0x314d | PBwaWUvQ1RGe1Maybe try checking the other file |
Two of the data portions, those with protocol 0x4c4b and 0x7361, like like they could be base64 encoded.
Let's use tshark to extract only the data.data field from these two communications.
Then we make it unique with uniq, convert the data to ascii with xxd and then base64 decode
┌──(kali㉿kali)-[/mnt/…/picoCTF/picoCTF_2023/Forensics/FindAndOpen]
└─$ tshark -r dump.pcap -Y 'eth.type == 0x4c4b' -T fields -e data.data | uniq | xxd -r -p | base64 -d
This is the secret: picoCTF{R34DING_LOKd_
┌──(kali㉿kali)-[/mnt/…/picoCTF/picoCTF_2023/Forensics/FindAndOpen]
└─$ tshark -r dump.pcap -Y 'eth.type == 0x7361' -T fields -e data.data | uniq | xxd -r -p | base64 -d
"��base64: invalid inputOK, looks like we have a possible password/secret for the zip-file (picoCTF{R34DING_LOKd_).
Finally, we unpack the zip-file and get the flag
┌──(kali㉿kali)-[/mnt/…/picoCTF/picoCTF_2023/Forensics/FindAndOpen]
└─$ unzip flag.zip
Archive: flag.zip
[flag.zip] flag password:
extracting: flag
┌──(kali㉿kali)-[/mnt/…/picoCTF/picoCTF_2023/Forensics/FindAndOpen]
└─$ cat flag
picoCTF{<REDACTED>}For additional information, please see the references below.