Tags: network pentest 

Rating:

# Stop and Listen

We're given an `.ovpn` config file and we need to connect to. Then, we need to listen to the traffic for the flag. Simple enough.

We can tell OpenVPN to use a config file by passing it as an argument.

```
$ sudo openvpn listen.ovpn
```

![](https://raw.githubusercontent.com/shawnduong/ctf-writeups/master/2019-TAMU/images/Stop-and-Listen-1.png)

Now, we just need to stop and listen to the traffic for the flag. We can easily do this by using Wireshark on the interface used by the VPN connection, `tap0`.

After a bit of listening, we find the flag transmitted in one of the packets.

![](https://raw.githubusercontent.com/shawnduong/ctf-writeups/master/2019-TAMU/images/Stop-and-Listen-2.png)

Original writeup (https://github.com/shawnduong/ctf-writeups/blob/master/2019-TAMU/Network-Pentest/Stop-and-Listen.md).