Skip to main content
  1. CTF Writeups/

Eavesdrop - picoGym

·182 words·1 min
picoGym Forensics Wireshark
Miles Handelman
Author
Miles Handelman

Link to challenge

This challenge gives us a .pcap file and instructs us to find the flag in it, with no hints being given directly in the description. Upon opening the file in wireshark, we see that the primary content of the pcap is a conversation between 10.0.2.15 and 10.0.2.3 over TCP port 9001.

PCAP Screenshot

By right clicking on one of these conversational packets and selecting the ‘Follow TCP Stream’ option on Wireshark, we can see the contents of the conversation between the two hosts.

Conversation Screenshot

This tells us that one of the users is transmitting an encrypted file over port 9002, which as stated in the screenshot, can be decrypted using OpenSSL using the command openssl des3 -d -salt -in file.des3 -out file.txt -k supersecretpassword123. To find the conversation over port 9002, we can use the Wireshark filter tcp.port == 9002, and then follow that conversation.

Salt

By changing the ‘show data’ dropdown on this window to ‘Raw’ and then saving it as ‘file.des3’ as the OpenSSL command has it, I have everything I need to decrypt the file and find the flag: picoCTF{nc(73115_411_0ee7267a}

Related

Matryoshka Doll - picoGym
·106 words·1 min
picoGym Forensics Steganography
PcapPoisoning - picoGym
·115 words·1 min
picoGym General Skills Wireshark
St3g0 - picoGym
·73 words·1 min
picoGym Forensics Steganography
hideme - picoGym
·94 words·1 min
picoGym Forensics Steganography
Based - picoGym
·127 words·1 min
picoGym General Skills Python ChatGPT
Serpentine - picoGym
·132 words·1 min
picoGym General Skills Python