Challenge Description

We shall start our journey by downloading the file using wget <link>. The downloaded file is a .pcap file. Hence we will continue by using Wireshark.

The capture.pcap file contained a total of 2317 packets. After checking the Protocol Hierarchy, I decided to use UDP as a display filter, and proceeded by following a random UDP stream.

PicoCTF Hint: What are streams?

This confirms that we should pay more attention to the streams in Wireshark.

Finding the flag

I analysed the various UDP streams, and managed to find the flag in the 6th stream.

Decoy Flags

There are decoy flags in this challenge, such as one fake flag in UDP 7th stream.

Flag

picoCTF{StaT31355_636f6e6e}