Challenge Category: Forensics
Challenge Points: 500
Find the fragments of a long-lost flag scattered across the network.
- We can use
tcpdump
to quickly filter through all packets to find a match closest to our flag.
tcpdump -qns 0 -A -r Shucks.pcapng | grep NYP
reading from file Shucks.pcapng, link-type EN10MB (Ethernet), snapshot length
262144
<title>NYP InfoSec CTF</title>
username=NYP%7Bpack&password=e7_dE7ec7ive%7D
<title>NYP InfoSec CTF</title>
- The flag is split between the
username
andpassword
form data. We can remove theusername=
and&password=
$ tcpdump -qns 0 -A -r forensics_shucks.pcapng | grep NYP | sed 's/username=//; s/&password=//' | grep -o "^NYP.*$"
NYP%7Bpacke7_dE7ec7ive%7D
- URL decode the flag
$ tcpdump -qns 0 -A -r forensics_shucks.pcapng | grep NYP | sed 's/username=//; s/&password=//' | grep -o "^NYP.*$" | php -r 'echo urldecode(fgets(STDIN));'
NYP{packe7_dE7ec7ive}