Challenge Description
Aha, a Wireshark challenge. First we download the .pcapng
file using wget <link>
.
Wireshark
Wireshark is a network analysis tool.
For more information, refer to this page.
Finding the flag
After opening the file in Wireshark, I first went to check the Protocol Hierarchy, and decided to use tcp
as a filter.
What is Protocol Hierarchy?
Protocol hierarchy in Wireshark is a feature that displays a breakdown of the different protocols used within the captured data, organized by their layers in the OSI model. It shows how much traffic each protocol generated in terms of packets and bytes, helping you understand the structure of the captured data.
This can identify potential points of interest.
Protocol Hierarchy in Wireshark
Simply head over to
Statistics > Protocol Hierarchy
to view the Protocol Hierarchy.
TCP Stream 5
After filtering the packets by using thetcp
filter, I went to check the TCP streams
. In tcp stream 5
, there was a string with the familiar curly braces {
and }
, which hinted that the string may be the flag we’re looking for.
Unfortunately, the flag isn't in plaintext.
Here’s what the string looks like:
Gur synt vf cvpbPGS{c33xno00_1_f33_h_qrnqorrs}
Retrieving the flag
Since I did not intuitively realise which cipher was used to encrypt the flag, I used a Cipher Identifier to do the job for me.
Since it highlighted that the string may have been encrypted using ROT13, I headed to CyberChef to obtain our flag. https://rot13.com/ also works.
Flag
picoCTF{p33kab00_1_s33_u_deadbeef}