토요일, 03 4 2021, 06:30 UTC — 일요일, 04 4 2021, 18:30 UTC

[Forensics]


If you look at HxD, you can see that there are two header signatures.
So, I was delete one header signature.

Flag : shaktictf{Y0U_4R3_aM4z1nG!!!!}


There are several packets with a 'pastebin address'.
One of them are real flag.

Flag : shaktictf{Th15_w4s_eA5Y!!}


strings network2.pcapng
I got some numbers.

Change decimal numbers to ASCII characters.

Then change the ascii text to base64.
.... I got fake flag.. 'n0tth4tea5y'

I can see many website address packet in wireshark.
One of them is strange. 'TUtxt.galf'
reversereverse this text.
flag.txt!!

change the ascii to raw and reverse.
f=open("reverse hex.txt")
data=f.read().split(' ')
print(' '.join(reversed(data)))
flag.zip file save.
The file has a password.
The password is fake flag!!!
pw : n0tth4tea5y

Flag : shaktictf{g00d_lUcK_4_tH3_n3xT_cH411eNg3}


The file has wrong header signature and IDAT chunks.

png header signature : 89 50 4E 47 0D 0A 1A 0A
IDAT : 49 44 41 54

Flag : shaktictf{Y4YyyyY_y0u_g0t_1T}


Check cmdscan among the Volatility options, there is base64 strings.

I got part 1 flag.

filescan | grep Part
I found Part 2.png file.
dumpfiles Part 2.png

zsteg -a part2.png
so I got part2 flag.
'#CTF 2021' 카테고리의 다른 글
UMDCTF 2021 write up (0) | 2021.04.19 |
---|---|
RITSEC CTF 2021 Write up (0) | 2021.04.11 |
Tenable CTF 2021 write up (0) | 2021.02.23 |
SecureBug CTF 2021 write up (0) | 2021.02.19 |
TrollCAT CTF 2021 write up(2) (0) | 2021.02.07 |