Tags: pcap 

Rating:

# Rock with the wired shark! (Misc, 70p)

```Sniffing traffic is fun. I saw a wired shark. Isn't that strange?```

As entry for this task we have **[pcapng](./dump.pcapng.gz)** file, and some poetry about wired shark...

After standard checking, seems in fact its Wireshark file. Lets dig into.

![traffic](./wireshark.png)

And what's there? Some TCP traffic and few http GET's. So lets try what we can extract. We got:
* **flag.zip** (nice)
* **html with error** (not important)
* **html from screen below** - so we can see someone was getting flag.zip from that page
![page](./page.png)

From those **flag.zip** looks most interesting. Its in fact zip archive containing **flag.txt**. Yay. But its also password protected. Buu.

_At this point I've lead myself astray (thinking task is harder, than it happened to be - judging by amount of points, not knowing those are at random:)._

_I was thinkig about bruteforcing this zip, but to do it in reasonable time, its good to have something more than archive itself. So I started to investigate code from here: http://seba-geek.de/stuff/servefile/ This link was in html file..._

_Bang! Dead End._

Lets go back to Wireshark. I've tried few tricks (without success off course). Than thought: lets look once more for **GET** requsts, maybe there is something interesting?
![traffic](./zippass.png)

Yup. "azulcrema". Now all what has left was to extract archive and enter flag.

**IW{HTTP_BASIC_AUTH_IS_EASY}**

Original writeup (https://github.com/raccoons-team/ctf/tree/master/2016-02-20-internetwache-ctf/misc70).