Skip to content

Latest commit

 

History

History
35 lines (23 loc) · 965 Bytes

PcapPoisoning.md

File metadata and controls

35 lines (23 loc) · 965 Bytes

PcapPoisoning

Challenge information

Level: Medium
Tags: picoCTF 2023, Forensics, pcap
Author: MUBARAK MIKAIL

Description:
How about some hide and seek heh?
Download this file and find the flag.

Hints:
(None)

Challenge link: https://play.picoctf.org/practice/challenge/362

Solution

Open the PCAP-file in Wireshark and let's take the description more or less literally by just assuming the flag are available in plain in the packet capture.

Set a display filter of tcp.payload contains "picoCTF" and press Enter.

Ah, only one packet matches and the flag is indeed visible in the ASCII details of the packet.

References