Skip to content

Commit 6ab56fc

Browse files
committed
Added writeup for splitted of mma-ctf-2015
1 parent 3696f24 commit 6ab56fc

File tree

3 files changed

+57
-0
lines changed

3 files changed

+57
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
[](ctf=mma-ctf-2015)
2+
[](type=forensics)
3+
[](tags=)
4+
[](tools=wireshark,gimp)
5+
[](techniques=)
6+
7+
# Splitted (forensics-30)
8+
9+
We're given [a pcap file](../splited.pcap), let's go ahead and open it in wireshark. We can easily see that a file called 'flag.zip' is being sent.. Let's filter required packets:
10+
> http && ip.src==192.168.4.10
11+
12+
We see 8 packets, so exported all the 8 packets as HTTP objects (File > Export Objects.. > HTTP).
13+
14+
From wireshark we can the range of each HTTP response, as follows.
15+
16+
Packet No | Range start
17+
----------|------------
18+
16 | 2345
19+
26 | 0
20+
36 | 1407
21+
46 | 2814
22+
56 | 3283
23+
66 | 469
24+
76 | 938
25+
86 | 1386
26+
27+
Sorted them according to range start
28+
29+
Packet No | Range start
30+
----------|------------
31+
26 | 0
32+
66 | 469
33+
76 | 938
34+
86 | 1386
35+
36 | 1407
36+
16 | 2345
37+
46 | 2814
38+
56 | 3283
39+
40+
Renamed the exported packets to follow this order, and assembled them:
41+
```bash
42+
$ mv packet-26 part-1.zip
43+
$ mv packet-66 part-2.zip
44+
$ mv packet-76 part-3.zip
45+
$ mv packet-86 part-4.zip
46+
$ mv packet-36 part-5.zip
47+
$ mv packet-16 part-6.zip
48+
$ mv packet-46 part-7.zip
49+
$ mv packet-56 part-8.zip
50+
$ cat part-*.zip > flag.zip
51+
$ unzip flag.zip
52+
```
53+
We see a file called 'flag.psd'. Opening it in GIMP, we see flag in the bottom layer
54+
55+
![Screenshot](screenshot.png)
56+
57+
> MMA{sneak_spy_sisters}
Loading
14.4 KB
Binary file not shown.

0 commit comments

Comments
 (0)