Rating:

[](ctf=mma-ctf-2015)
[](type=forensics)
[](tags=)
[](tools=wireshark,gimp)
[](techniques=)

# Splitted (forensics-30)

We're given [a pcap file](../splited.pcap), let's go ahead and open it in wireshark. We can easily see that a file called 'flag.zip' is being sent.. Let's filter required packets:
> http && ip.src==192.168.4.10

We see 8 packets, so exported all the 8 packets as HTTP objects (File > Export Objects.. > HTTP).

From wireshark we can the range of each HTTP response, as follows.

Packet No | Range start
----------|------------
16 | 2345
26 | 0
36 | 1407
46 | 2814
56 | 3283
66 | 469
76 | 938
86 | 1386

Sorted them according to range start

Packet No | Range start
----------|------------
26 | 0
66 | 469
76 | 938
86 | 1386
36 | 1407
16 | 2345
46 | 2814
56 | 3283

Renamed the exported packets to follow this order, and assembled them:
```bash
$ mv packet-26 part-1.zip
$ mv packet-66 part-2.zip
$ mv packet-76 part-3.zip
$ mv packet-86 part-4.zip
$ mv packet-36 part-5.zip
$ mv packet-16 part-6.zip
$ mv packet-46 part-7.zip
$ mv packet-56 part-8.zip
$ cat part-*.zip > flag.zip
$ unzip flag.zip
```
We see a file called 'flag.psd'. Opening it in GIMP, we see flag in the bottom layer

![Screenshot](screenshot.png)

> MMA{sneak_spy_sisters}

Original writeup (https://github.com/ByteBandits/writeups/tree/master/mma-ctf-2015/forensics/splitted/chaitan94).