Rating:

Challenge (Forensic)

It is a straight forward challenge, use your tools wisely

Author - 0xCyberPj

link [download](images/vim-bar.pcap)

-------------------------

Since it's a pcap file, we can use wireshark to explore.

![overview](images/1.PNG)

We can see that its just TCP packets. Looking at the stream index, we can see there are 3 different TCP streams.

Following the TCP stream 0, we can see its actually the output of the terminal. But it doesn't help us much.

![tcp_stream_0](images/2.PNG)

Moving on to TCP stream 1, we see there are just 2 packets and one of them is RST so we can skip this.

TCP stream 2 also doesn't provide us much info.

![tcp_stream_2](images/3.PNG)

TCP stream 3 is where things get interesting. This has the hex dump of a file and the hint vim_crypt tells us that its a file encrypted by vim.

![tcp_stream_3](images/4.PNG)

So we create the file locally using the hex dump. But when we open it with vim, we can see its encrypted and is asking for the key

![vim_b](images/5.PNG)

I'm using the python package called [vimdecrypt](https://github.com/nlitsme/vimdecrypt) to bruteforce the password using the rock_you wordlist.

![flag](images/6.PNG)

The password used to encrypt was **samantha** and the flag is **TamilCTF{vi_vii_viiim_lol}**

Original writeup (https://github.com/Sharashchandra/TamilCTFWriteups/tree/main/vim_bar).