Fl4g_Tr4nsf3r_Pr0t0c0l
Last updated
Was this helpful?
Last updated
Was this helpful?
here is the executable file to download
the file given is a pcapng extension so it should be opened with wireshark to analyze the traffic and try to extract informations
from the name we can know that we have to search for the traffic of ftp protocol so let's filter the traffic based on the ftp protocol
reading the traffic we can see that the user is transferring the flag through ftp protocol since the traffic of ftp is captured using wireshark we can extract the file transfered into our machine and take a look at its content
and now let's check if we have extracted this file and yes we did
let's read it's content and since it's combination contains only uppercase letters and numbers and ends with = sign it's likely to be a base32
let's decode this base32 and it gives us hex numbers
let unhex those hex numbers and it gives us a base64 result because the result is a combination of uppercase and lowercase characters and numbers and ends with = sign
note that if you dont have pwntools library installed in your machine you will not be able to use the unhex command so you can use online websites like cyberchef to unhex the hex numbers
let's decode the base64 and we get the flag
DEFENSYS{FTP_1S_N0T_S0_S3CUR3_4FT3R_4L1}
Greetings from Sayonara