ja4a4a4do0o0ore SSH !

misc FCSC 2025 solved on

star

Description

A beneficiary has automated many tasks using SSH connections. Unfortunately, during a transition to key-based authentication, the password used by SSH clients was compromised, and they suspect that an attacker infiltrated their local network by interactively connecting to their server.

Find the attacker’s IP address in the captured network trace among all the usual SSH connections.

The flag consists of the SSH connection cookies exchanged between the attacker and the server in the following format: FCSC{cookie_ssh_client-cookie_ssh_server}.

A fixed addressing plan would have been useful, but Christmas is still a few months away…

Files

Author

Pac

Flag

Share my success on Fediverse, Twitter, Linkedin, Facebook, or via email.

Submit your solution

You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.

You need to be logged in to submit a writeup.

Writeups

I've been looking for a long time and I still can't find the flag!

You can vote for the solutions you prefer by using the on their respective pages.

DateAuthor Language Tags
2025-04-30
Trachinus
🇫🇷