H4ck3R_m4n exp0sed!

This chall gave me a pcap with FTP communications without secure encryption. Analysing files transferred I saw an interesting image.

First I exported data from the Wireshark to a binary file and after concatenating it into a single file.

cat butter1.bin butter2.bin > butter.jpg

Flag 2

The second flag is very similar to the first. Exporting "supersecure.7z" content.

cat supersecure1.bin supersecure2.bin supersecure3.bin supersecure4.bin supersecure5.bin supersecure6.bin supersecure7.bin supersecure8.bin supersecure9.bin supersecure10.bin supersecure11.bin supersecure12.bin supersecure13.bin supersecure14.bin supersecure15.bin supersecure16.bin supersecure17.bin supersecure18.bin supersecure19.bin supersecure20.bin supersecure21.bin supersecure22.bin supersecure23.bin supersecure24.bin > supersecure.7z
compressssion_info.txt
The password for the compressed file is "bbqsauce"

Extract the image and get the flag πŸŽ‰

Last updated