Tags: network 

Rating:

Network - DockerLeak - 50pts

Enoncé :

During the deployment of the challenges of the THC, an attacker was able to dump the network traffic.

Can you find the flag?

On commence avec un fichier dump.pcap Sources

Résolution :

Comme tout challenge à 50 points l'option la plus rapide est souvent la commande strings :

strings dump.pcap | grep -A1 -i THC{
#define FLAG "THC{d0c4ErSo(ke!m
5T_U5e_HtT6S}"

Flag :

THC{d0c4ErSo(ke!m5T_U5e_HtT6S}

By team Beers4Flags

 ________
|        |
|  #BFF  |
|________|
   _.._,_|,_
  (      |   )
   ]~,"-.-~~[
 .=] Beers ([
 | ])  4   ([
 '=]) Flags [
   |:: '    |
    ~~----~~
Original writeup (https://github.com/Beers4Flags/writeups/tree/master/2018/Thcon/Network/50).