YCTF

Echo Chamber by glys

2024-09-30(1 min. read) - forensics scripting

Description

Is anyone there? Is anyone there? I'm sending myself the flag! I'm sending myself the flag!


We are given a pcap with what seems to be only icmp (ping) packets.

Opening it in wireshark we inspect packet fields and find a data field containing what looks like repeating hex byte data.

So we extract it to a file, making sure we only take one side of the communications (icmp.type == 8) since seems like all requests are echoed with same data

   huntress tshark -2 -r echo_chamber.pcap -R "data.data && icmp.type == 8" -T fields -e data.data > content
   huntress head content
89898989898989898989898989898989898989898989898989898989898989898989898989898989
50505050505050505050505050505050505050505050505050505050505050505050505050505050
4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e4e
47474747474747474747474747474747474747474747474747474747474747474747474747474747
0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d0d
0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a
1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a1a
0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a0a
00000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000

These really look like a sequence of hex encoded bytes. Let's take first 2 chars each line and decode

   huntress cut -c 1-2 content | tr -d '\n' | xxd -r -p > out
   huntress file out
out: PNG image data, 1961 x 139, 8-bit grayscale, non-interlaced
   huntress exiftool out
...
Caption                         : flag{6b38aa917a754d8bf384dc73fde633ad}
...

The image also is the flag