Rating:

Writeup URL: [GitHub](https://infosecstreams.github.io/csaw21/contact-us/)
# Contact Us

Writeup by: [OreoByte](https://github.com/OreoByte)

Team: [OnlyFeet](https://ctftime.org/team/144644)

Writeup URL: [GitHub](https://infosecstreams.github.io/csaw21/contact-us/)

---

```text
Veronica sent a message to her client via their website's Contact Us page. Can you find the message?

Author: moat, Pacific Northwest National Laboratory
```

## Using Wireshark Decrypt The SSL Traffic

Using the given files `sslkeyfile.txt` and `ContactUs.pcap` we can start to decrypt the pcap.

Navigate through `Edit -> Preferences -> Protocols -> TLS -> (Pre)-Master-Secret log filename`, click browse and select the `sslkeyfile.txt` file.

![Decrypt TLS in Wireshark](./decrypt.png)\

Find the decrypted flag in the packet capture.

![Search for the Flag](./search.png)\

---

## Using Tshark

You can do the same thing but with `tshark`:

1. Decrypt Pcap into a new file
* `tshark -r ContactUs.pcap -V -x -o tls.keylog_file:key.log > results`

1. grep to win for the flag
* `grep 'flag{' results`

![Tshark](./tshark.png)\

---

## Victory

Submit the flag and claim the points:

`flag{m@r$hm3ll0w$}`

Original writeup (https://infosecstreams.github.io/csaw21/contact-us/).