Rating:
# The SUM of All FEARS
![Category](http://img.shields.io/badge/Category-Traffic_Analysis-orange?style=for-the-badge) ![Points](http://img.shields.io/badge/Points-50-brightgreen?style=for-the-badge)
## Details
>After hacking a victim's computer, Luciafer downloaded several files, including two binaries with identical names, but with the extensions .exe and .bin (a Windows binary and a Linux binary, respectively).
>
>What are the MD5 hashes of the two tool programs? Submit both hashes as the flag, separated by a |: flag{ExeMD5|BinMD5}
>
>Use the PCAP from LYTTON LABS 01 - Monstrum ex Machina.
---
This time we filter the packet capture by `ftp-data`
Scrolling through the packets we can see;
First we select one of the packets relating top the file `lytton-crypt.exe` and `Follow TCP Stream`;
Then we change the data to be in `RAW` format
And click the `Save as...` button saving the file as `lytton-crypt.exe`
We then repeat the process for the `lytton-crypt.bin` file.
Select one of the packets relating top the file `lytton-crypt.bin` and `Follow TCP Stream`;
Then we change the data to be in `RAW` format
And click the `Save as...` button saving the file as `lytton-crypt.bin`
Now we have both files exported, we can run;
```
❯ md5sum lytton-crypt.*
8a84e7153aa083b66cd89c652bef27da lytton-crypt.bin
9cb9b11484369b95ce35904c691a5b28 lytton-crypt.exe
```
## flag{9cb9b11484369b95ce35904c691a5b28|8a84e7153aa083b66cd89c652bef27da}