encrypted traffic

File Attachment :

Challenge Idea :

the idea of this challenge is decrypting https traffic using a master log file and extracting a protected secret zip file that contains base64 encoded flag

Walkthrough :

first thing let's open the pcapng file in wireshark and analyze the traffic

first let's see what are all the protocols captured in this network file

based on the name of the challenge which is encrypted traffic we should focus more on TLS protocol which is responsible for encrypting http traffic

in the task attachment we have sslkey.log which can be used as a pre-master secret log file to decrypt HTTPS traffic to do that go to edit -> preferences -> protocols -> TLS -> (pre)-master secret log filename and browse to the sslkey.log file and then click ok

again let's take a look at the protocol hierarchy at statistics -> protocol hierarchy

we can notice that a new protocol is introduced which is a result of the decryption of https traffic

in wireshark let's filter by http

let's export http files and take a look at there content and try to search for the leaked information

go to file -> export objects -> http

let's save all the files and try to examine the files for any leaked infos.

first thing we have to check the files type because for exemple the file show is a png file but we can't see its content unless we have added the .png extention to the filename

after looking at all the files there's an interesting file which is a zip file

let's change the name and add the extension of zip

unzipping the file asks for a password, in the beginning i have tried to crack it using john and then i tried to find the password from the http traffic but the password was in front of my eyes which was CODEBY{w3ll_d0n3!}

a file called flag is extracted, examining its type it shows that its an executable

Flag :

CODEBY{tls_4nd_w1resh4rk_<3}

Last updated

Was this helpful?