BattleX CTF - forensics

What is the flag?

What is the flag?

29th Jun 2024

CTFForensicsWriteupBattleX CTF

BattleX CTF: forensics

Category: Forensics

Score: 30

Number of Solves: 5

Description

what is the flag?

Files Attached: hacksparo-1719532531350.pcapng

TL; DR

Network log file (pcapng) anaysis using Wireshark, Profit.

Log analysis with Wireshark

I downloaded the attachment and it turned out to be a network capture file, probably made with wireshark. So, I proceeded to open it with wireshark.

wireshark hacksparo-1719532531350.pcapng

Regular Wireshark Screen

I srolled down a bit and saw HTTP requests, which ended up worth checking. I applied HTTP filter to bring up related stuff.

http_request_filtered

Marked suspicious http request on entry 8998

On inspection, I saw a post request from ip 172.20.10.3 to 172.20.10.8 which is the server. The request contained text that resembles base64. I proceeded to export it as object and try to make sense out of it. To do this is easy.

File > Export Objects > HTTP...

export_upload

-----------------------------401050937020745333952489344779
Content-Disposition: form-data; name="file"; filename="tazine"
Content-Type: application/octet-stream

iVBORw0KGgoAAAANSUhEUgAAAVEAAAAcCAYAAADYx4xEAAAABHNCSVQICAgIfAhkiAAAABl0RVh0U29mdHdhcmUAZ25vbWUtc2NyZWVuc2hvdO8Dvz4AAAAmdEVYdENyZWF0aW9uIFRpbWUAVGh1IDI3IEp1biAyMDI0IDIzOjM1OjAzCR0IsAAAFFtJREFUeJztnXtczfcfx5/ndHRRuSYp1dCaiuXOzzDzG2P4MSzEXHMnhhiihOU+ueReW0xMmkRuM3NJllvKXdGMLlapdTvUqd8fR0dHdb5fD8Y23+fj0ePROe/v9/N+f17nc/t+Pp/zObJ3GzYt5jnk+sU4r7yBkZWSwmwFMZMceJKleP4yLZydG7NrRyDXr98gJHQfVlaWNGrkwIiREzA1Meb0ySPExMThv34zHTq0Y9hQV5KSk/lfr4Fk52QD4OTkyI8h29m//
[snip]

upload.php

profit

Using https://base64.guru , I was able to convert that to a file as its clearly not a plain text.

Flag: battlex{e99a18c428cb38d5f260853678922e03}

References

  1. https://base64.guru/converter/decode/file