Rating:

The flag must be somewhere around here... is what we’re told and we’re given another .pcap file, let’s fire up wireshark once again! On exporting the HTTP objects list, we get 2 zip files: nothinghere.tar.gz, nothinghere.zip.

On extracting the nothinghere.tar.gz, we get a flag.txt which contains base64 encoded text:

RGF3Z0NURnszeHRyNGN0MW5nX2YxbDM1XzFzX2Z1bn0=, which on decoding gives us the flag:
DawgCTF{3xtr4ct1ng_f1l35_1s_fun}

View the full writeup [here](https://github.com/abhichitkara/DawgCTF20-Writeups/blob/master/DawgCTF%20Writeups.pdf)