Challenge Description

Seems like a typical network forensics challenge. After downloading the pcap file using wget, we can use Wireshark to get the flag.

Wireshark

Since there are only 9 packets in this pcap file, finding the flag was straightforward. Display filters was not necessary.

Using strings

strings also works here. The flag is revealed instantaneously.

For both methods, all we have to do after that is just formatting the flag, that is, removing the redundant spaces in between the characters.

Flag

picoCTF{p4ck37_5h4rk_01b0a0d6}