Rating: 2.0

Analyzing the pcap we saw something strange in the ICMP packets and after examine the “type” of them we realized there was a GIF header, so we extracted all the ICMP types with “ip.src = 10.136.255.127” and obtained a GIF file with the flag “flag{we_ride_at_midnight}”

Command:
tshark -r data.pcap -Y 'icmp and !(ip.src==10.136.255.127 and ip.src==128.227.236.205) and ip.src==10.136.255.127' -x | grep "0020" | cut -d" " -f5 | sed ':a;N;$!ba;s/\n//g' | xxd -r -p > output.gif

Note: The extraction can also be made with "scapy".

By @fikih888