Skip to content

Latest commit

 

History

History
32 lines (22 loc) · 904 Bytes

PcapPoisoning.md

File metadata and controls

32 lines (22 loc) · 904 Bytes

PcapPoisoning

Challenge information

Points: 100
Tags: picoCTF 2023, Forensics, pcap
Author: MUBARAK MIKAIL

Description:
How about some hide and seek heh?
Download this file and find the flag.

Hints:
(None)

Challenge link: https://play.picoctf.org/practice/challenge/362

Solution

Open the PCAP-file in Wireshark and let's take the description more or less literally by just assuming the flag are available in plain in the packet capture.

Set a display filter of tcp.payload contains "picoCTF" and press Enter.

Ah, only one packet matches and the flag is indeed visible in the ASCII details of the packet.

References