PicoCTF - Wireshark twoo twooo two twoo...

PicoCTF - Wireshark twoo twooo two twoo…

tags: PicoCTF CTF Misc

Challenge: Wireshark twoo twooo two twoo…

Exploit - DNS + sub-domain

  1. Statistic Using statistic to analyze http requests and you’ll see that there is /flag and / in address 18.217.1.57. Maybe it’s a clue or key to find flag
  2. String search technique
     $ strings shark2.pcapng | grep "pico"
     picoCTF{bfe48e8500c454d647c55a4471985e776a07b26cba64526713f43758599aa98b}
     picoCTF{bda69bdf8f570a9aaab0e4108a0fa5f64cb26ba7d2269bb63f68af5d98b98245}
     picoCTF{fe83bcb6cfd43d3b79392f6a4232685f6ed4e7a789c2ce559cf3c1ab6adbe34b}
     picoCTF{711d3893d90f100c15e10ef4842abeed3a830f8237c1257cd47389646da97810}
     picoCTF{3cf1e22d489fcfb6bb312a34f46c8699989ed043406134331452d11ce73cd59e}
     picoCTF{b4cc138bb0f7f9da7e35085e349555aa6d00bdca3b021c1fe8663c0a422ce0d7}
     picoCTF{41b8a1a796bd8d202016f75bc5b38889e9ea06007e6b22fc856d380fb7573133}
     ...
    

    You’ll find tons of fake flag. Obviously, it’s a trap to distract you.

  3. Reanalyze the file I found that there’re many DNS request to {sub-domain}.reddshrimpandherring.com. Also, I use the filter http and ip.addr==18.217.1.57 and follow the http stream. Seems this address is a clue.

  4. 通靈

    : Set new filter payload: set the filter as dns and ip.dst==18.217.1.57 You’ll see that the sub-domain is a sequence base64 strings. Concate them and decode it, you can fetch the flag. $\to$ cGljb0NURntkbnNfM3hmMWxfZnR3X2RlYWRiZWVmfQ== $\to$ picoCTF{dns_3xf1l_ftw_deadbeef}

Reference

Wireshark twoo twooo two twoo…