Back to Walkthroughs
Ph4nt0m 1ntrud3r
PicoCTF Forensics [Easy]Easy

Ph4nt0m 1ntrud3r

#tutorial

Challenge Details

Screenshot 2025-08-08 124115

Analysis and Solution

After downloading the file, we can see it is a pcap file, we can use wireshark which is a robust packet analysis tool for this as shown

Screenshot 2025-08-08 124436

we can see that the packets are not ordered, the time each packet has arrived is different and not in any concise order

Screenshot 2025-08-08 124443

Further more on the above image we can see small amounts of data base 64 encoded as well. To extract this information we can use the strings command to do so.

└─$ strings myNetworkTraffic.pcap 
ezF0X3c0cw==
cGljb0NURg==
bnRfdGg0dA==
Yt8ksMM=
3psv5C4=
YQEFzIU=
YmhfNHJfOQ==
a23/UbI=
TOGSGg4=
bpzQ0R8=
fQ==
nfu4Vww=
J4auZMY=
ePRXDio=
fjIzQwk=
XThGxuE=
ckBkZLk=
CJr4oDk=
BgJLB0c=
XzM0c3lfdA==
NTlmNTBkMw==
dgV9v0s=

However this is not in order, to order them according to the time in which they were sent we have to make use of tshark which is a CLI based packet analysis tool.

└─$ tshark -r myNetworkTraffic.pcap -Y "tcp.len > 0" -T fields -e frame.time_epoch -e tcp.payload | sort -n | cut -f 2- | while read payload; do if [ -n "$payload" ]; then echo ${payload//:} | xxd -r -p; echo; fi; done
ePRXDio=
dgV9v0s=
nfu4Vww=
XThGxuE=
CJr4oDk=
TOGSGg4=
ckBkZLk=
YQEFzIU=
3psv5C4=
a23/UbI=
BgJLB0c=
Yt8ksMM=
fjIzQwk=
bpzQ0R8=
J4auZMY=
cGljb0NURg==
ezF0X3c0cw==
bnRfdGg0dA==
XzM0c3lfdA==
YmhfNHJfOQ==
NTlmNTBkMw==
fQ==
             

submit the base64 decoded flag to complete the challenge!