Trivial Flag Transfer Protocol
Problem
Figure out how they moved the flag.
Solution
Open the packet capture file in wireshark. Go to File > Export Objects > TFTP.
If we preview the
instructions
document we find:GSGCQBRFAGRAPELCGBHEGENSSVPFBJRZHFGQVFTHVFRBHESYNTGENAFSRE.SVTHERBHGNJNLGBUVQRGURSYNTNAQVJVYYPURPXONPXSBEGURCYNA
. Putting this into quipqiup decodes it tot ftp doesnt encrypt our traffic so we must disguise our flag transfer figure out away to hide the flag and i will check back for the plan
. The encoding is simply ROT13 so quipqiup is overkill. You can use cryptii instead.The
plan
document saysVHFRQGURCEBTENZNAQUVQVGJVGU-QHRQVYVTRAPR.PURPXBHGGURCUBGBF
, which decodes toi used the program and hid it with due diligence check out the photos
.Save the
program.deb
file. Let's see if we can use it to decode the images. Theprogram.deb
is actuallysteghide
(this is easily seen if you extract it), so install it if you don't already have it installed withsudo dpkg -i program.deb
.The hint from the
plan
document suggests thatDUEDILIGENCE
(uppercase because the encoded text is uppercase) is the password.We can use
steghide
on every image included in the packet capture file. The flag is hidden in the last imagepicture3.bmp
. So runsteghide extract -sf picture3.bmp -p DUEDILIGENCE
andcat flag.txt
to get the flag.
Flag
picoCTF{h1dd3n_1n_pLa1n_51GHT_18375919}
Last updated