Home CTFs | HackDay2023 | Forensic | Assassins Communication
Post
Cancel

CTFs | HackDay2023 | Forensic | Assassins Communication

Context

context

We have got a wireshark capture named leak.pcapng

I used binwalk on the capture to see if it contains something:

binwalk

Here is what we have got:

binwalk_result

The flag.txt file is empty and the zip file is password protected

binwalk_result2

So i decided to crack it !

john Well… I’ve got nothing.

Let’s take a look at the wireshark capture. Looking at the HTTP conversation, I see that there is an image in the conversation that is in plain text.

wireshark

I saved it (put the data in raw first)

raw

And I opened it

image

Let’s try to run steghide on this image.

steghide

It’s password protected. Let’s try to brute force it with stegseek:

stegseek

We’ve got the zip password ! (aBqw7FB0f3VqTZrW)

Let’s open the zip file.

flag

We’ve got the flag, well done !!

This post is licensed under CC BY 4.0 by the author.