Rating:

# Wireshark doo dooo do doo...

Category: Forensics

AUTHOR: DYLAN

**Disclaimer! I do not own the challenge files!**

## Description
```
Can you find the flag? shark1.pcapng.
```

## Wireshark

Since we received a `.pcap` file, I opened it up in wireshark. Lets have a look:

![sample](./sample.png)


I can see some `http` traffic. And since my tactic for wireshark in CTFs is to start with this filter:

![http](./http.png)


Or even better, with this filer:


![http_200](./http_200.png)


```
http.response.code == 200
```
This plays perfectly in my hands. Now just to find a good packet stream.

![encrypted](./encrypted.png)


Damn! It's all kerberos encrypted traffic.. or is it? Scroll all the way down (with the `200 OK` filter on):

![text](./text.png)


Great! Finally something normal! Now just do the following:

![follow](./follow.png)


And this pops out:
```
GET / HTTP/1.1
Host: 18.222.37.134
Connection: keep-alive
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.105 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9

HTTP/1.1 200 OK
Date: Mon, 10 Aug 2020 01:51:45 GMT
Server: Apache/2.4.29 (Ubuntu)
Last-Modified: Fri, 07 Aug 2020 00:45:02 GMT
ETag: "2f-5ac3eea4fcf01"
Accept-Ranges: bytes
Content-Length: 47
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html

Gur synt vf cvpbPGS{c33xno00_1_f33_h_qrnqorrs}
```
And since this is a CTF, how about we just assume this to be ROT13 encoded? An online decoder is enough, like [this one](https://www.boxentriq.com/code-breaking/rot13):

![flag](flag.png)



Huzzah!

Original writeup (https://github.com/xnomas/PicoCTF-2021-Writeups/tree/main/Wireshark_doo_dooo_do_doo).