Skip to content

Commit 21cce8e

Browse files
committed
feat: add Forensics-Dino Trading writeup
1 parent b535b63 commit 21cce8e

File tree

6 files changed

+34
-0
lines changed

6 files changed

+34
-0
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
## Forensics - Dino Trading
2+
3+
### Description
4+
5+
> Dino Trading
6+
>
7+
> 100
8+
>
9+
> Easy Meep#2331
10+
>
11+
> I love trading dinosaurs with my friends! I'm sure nobody can see what we're sending, because otherwise, my dinosaurs might get taken.
12+
13+
### Exploit
14+
15+
We were given a [*.pcapng](chall/download.pcapng) file to analyze. I opened the file using Wireshark then I found a packet using FTP protocol. Next, I followed the protocol streams and got some information.
16+
17+
![ftp-wireshark](assets/ftp-wireshark.png)
18+
19+
Based on that FTP stream, there was a jpg file was sent via the FTP protocol. Because, I got problem when extracting that file, I convert the `*.pcapng` file to `*.pcap` using tshark.
20+
21+
![conver](assets/convert.png)
22+
23+
Then, I opened the flag using Network Miner and got `epicfight.jpg` file.
24+
25+
![nm](assets/networkminer.png)
26+
27+
Last step, I used steganography tools named `steghide` to extract the `*.jpg` file and got the flag.
28+
29+
![flag](assets/flag.png)
30+
31+
So, the flag was
32+
```
33+
wctf{an_1mage_in_a_peecap_b64}
34+
```
Loading
Loading
Binary file not shown.

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy