PicoCTF - Wireshark twoo twooo two twoo…
tags: PicoCTF
CTF
Misc
Challenge: Wireshark twoo twooo two twoo…
Exploit - DNS + sub-domain
- Statistic
Using statistic to analyze http requests and you’ll see that there is
/flag
and/
in address18.217.1.57
. Maybe it’s a clue or key to find flag - String search technique
$ strings shark2.pcapng | grep "pico" picoCTF{bfe48e8500c454d647c55a4471985e776a07b26cba64526713f43758599aa98b} picoCTF{bda69bdf8f570a9aaab0e4108a0fa5f64cb26ba7d2269bb63f68af5d98b98245} picoCTF{fe83bcb6cfd43d3b79392f6a4232685f6ed4e7a789c2ce559cf3c1ab6adbe34b} picoCTF{711d3893d90f100c15e10ef4842abeed3a830f8237c1257cd47389646da97810} picoCTF{3cf1e22d489fcfb6bb312a34f46c8699989ed043406134331452d11ce73cd59e} picoCTF{b4cc138bb0f7f9da7e35085e349555aa6d00bdca3b021c1fe8663c0a422ce0d7} picoCTF{41b8a1a796bd8d202016f75bc5b38889e9ea06007e6b22fc856d380fb7573133} ...
You’ll find tons of fake flag. Obviously, it’s a trap to distract you.
-
Reanalyze the file I found that there’re many DNS request to
{sub-domain}.reddshrimpandherring.com
. Also, I use the filterhttp and ip.addr==18.217.1.57
and follow the http stream.Seems this address is a clue.
-
通靈
: Set new filter payload: set the filter as
dns and ip.dst==18.217.1.57
You’ll see that the sub-domain is a sequence base64 strings. Concate them and decode it, you can fetch the flag. $\to$
cGljb0NURntkbnNfM3hmMWxfZnR3X2RlYWRiZWVmfQ==
$\to$picoCTF{dns_3xf1l_ftw_deadbeef}