Rating: 3.0

In this challenge, we start with a network capture and we want to find which `SSH` version was eventually compromised by a brute force attack.

Let's read the capture with `tshark` :

```sh
tshark -r PCAP02.pcapng
```

We have a lot of packets in this capture and different protocols. We are looking for `SSH` so let's filter the output :

```sh
tshark -r PCAP02.pcapng -Y "ssh"
```

Now we can reduce the number of packets by filtering with `grep` to keep only `SSH` versions :

```sh
tshark -r PCAP02.pcapng -Y "ssh" | grep SSH-
```

We have the version `SSH-2.0-9.29 FlowSsh: Bitvise SSH Server (WinSSHD) 9.29` so let's try the flag `flag{SSH-2.0-9.29 FlowSsh: Bitvise SSH Server (WinSSHD) 9.29}`

And here we are, the challenged is validated !