# Wireshark doo dooo do doo...

## Problem

> Can you find the flag? shark1.pcapng.

* [shark1.pcapng](https://github.com/HHousen/PicoCTF-2021/blob/master/Forensics/Wireshark%20doo%20dooo%20do%20doo.../shark1.pcapng)

## Solution

1. Open the file in wireshark and type in `tcp.stream eq 5` to get the 5th TCP stream.
2. Right click any entry, click follow, and then click "TCP Stream."
3. The flag will now be shown, but it is encoded: `Gur synt vf cvpbPGS{c33xno00_1_f33_h_qrnqorrs}`
4. We can decode the flag by passing it through ROT13 since this is a basic Caesar's cipher. You can decode ROT13 using [CyberChef](https://gchq.github.io/CyberChef/#recipe=ROT13\(true,true,false,13\)\&input=R3VyIHN5bnQgdmYgY3ZwYlBHU3tjMzN4bm8wMF8xX2YzM19oX3FybnFvcnJzfQ), for instance.

### Flag

`picoCTF{p33kab00_1_s33_u_deadbeef}`


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://picoctf2021.haydenhousen.com/forensics/wireshark-doo-dooo-do-doo....md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
