Author: PinkNoize
Forensics - 150
We found this packet capture. Recover the flag. You can also find the file in /problems/shark-on-wire-1_0_13d709ec13952807e477ba1b5404e620.
This challenge provides a PCAP file. Search UDP streams for the flag.
This challenge provides us with a pcap file, which is a file containing captured network traffic. We can start by opening this file with wireshark.
We then can filter for TCP as it is one of the most common protocols used in the internet. We can filter by typing tcp
into the filter bar above.
We can now view the packets and follow the TCP streams but nothing interesting comes up. Lets try filtering by udp
now. This gives us a lot of packets so we can search for the string 'pico' as we know it is the flag. You can do this by clicking on the Edit tab and clicking "Find Packet" or Ctrl + F. Set up the search like in the image below.
This yields some some packets with the string pico, but nothing other than that. If we go to the first set of UDP packets, we see that the first many are of LEN=1. Clicking through these show that the characters, p, i, c, o, show up in that order. We can then follow the UDP stream by right-clicking on the packet 63 and clicking follow then UDP stream.
This result is the flag, picoCTF{StaT31355_636f6e6e}
.