본문 바로가기
<개인공부> - IT/[CTF (Write up)]

Securinets Prequals 2K19 Write-up (Easy Trade)

by Aggies '19 2019. 3. 24.
반응형

foren_trade.pcap


This is a basic forensic question. This is my approach. I only used Wireshark Follow TCP Stream feature.

Fortunately, the provided pcap file is not big so I skimmed every line.



In the pcap file I found some clues for the flag. Between hosts exchanged the key and flag.txt is sent in a zip file.


>> 50 40 03 04 is the signature for zip file


I used the Follow TCP Stream function (Analyze >> Follow >> TCP Stream, shortcut - Ctrl + Alt + Shift + T) to downlad the zip file.




The string is 

504b03040a00090000006e80774e2064e5de480000003c00000008001c00666c61672e7478745554090003c04a965cc04a965c75780b000104e803000

004e80300001c0786f2a0ac34d99333f0b9192dcbb4745efd2fe45b7db533f00ad89b7512b8213a65f95e827be6c2638fac42c4a133bb22d5e92a958a18

3ebdae0ca39b3bfce5c46b5d96883b5c504b07082064e5de480000003c000000504b01021e030a00090000006e80774e2064e5de480000003c000000

080018000000000001000000b48100000000666c61672e7478745554050003c04a965c75780b000104e803000004e8030000504b0506000000000100

01004e0000009a0000000000


And I saved it and when I opened the zip file I found the flag.txt. However, it needs a password for extraction so I looked through some lines. Easily I could find the password that is securinetsXD


BUT, this is not all. I had to decode one more time using base64. In the flag.txt file there is 

> c2VjdXJpbmV0c3s5NTRmNjcwY2IyOTFlYzI3NmIxYTlmZjg0NTNlYTYwMX0


$ echo "c2VjdXJpbmV0c3s5NTRmNjcwY2IyOTFlYzI3NmIxYTlmZjg0NTNlYTYwMX0" | base64 -d


Flag : securinets{954f670cb291ec276b1a9ff8453ea601}

Reference site: https://www.ctfsecurinets.com/challenges#Easy%20Trade

반응형