You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're given [a pcap file](../splited.pcap), let's go ahead and open it in wireshark. We can easily see that a file called 'flag.zip' is being sent.. Let's filter required packets:
10
+
> http && ip.src==192.168.4.10
11
+
12
+
We see 8 packets, so exported all the 8 packets as HTTP objects (File > Export Objects.. > HTTP).
13
+
14
+
From wireshark we can the range of each HTTP response, as follows.
15
+
16
+
Packet No | Range start
17
+
----------|------------
18
+
16 | 2345
19
+
26 | 0
20
+
36 | 1407
21
+
46 | 2814
22
+
56 | 3283
23
+
66 | 469
24
+
76 | 938
25
+
86 | 1386
26
+
27
+
Sorted them according to range start
28
+
29
+
Packet No | Range start
30
+
----------|------------
31
+
26 | 0
32
+
66 | 469
33
+
76 | 938
34
+
86 | 1386
35
+
36 | 1407
36
+
16 | 2345
37
+
46 | 2814
38
+
56 | 3283
39
+
40
+
Renamed the exported packets to follow this order, and assembled them:
41
+
```bash
42
+
$ mv packet-26 part-1.zip
43
+
$ mv packet-66 part-2.zip
44
+
$ mv packet-76 part-3.zip
45
+
$ mv packet-86 part-4.zip
46
+
$ mv packet-36 part-5.zip
47
+
$ mv packet-16 part-6.zip
48
+
$ mv packet-46 part-7.zip
49
+
$ mv packet-56 part-8.zip
50
+
$ cat part-*.zip > flag.zip
51
+
$ unzip flag.zip
52
+
```
53
+
We see a file called 'flag.psd'. Opening it in GIMP, we see flag in the bottom layer
0 commit comments