Skip to content

Latest commit

 

History

History
 
 

for_100_uagent

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 

uagent (Forensics, 100p)

We think we are really cool, are we?

Download

###ENG PL

We start off with a pcap file, a file is begin downladed throughout some packets, let's export them by filtering them out and using File->Export Objects->Http

screen1

The packets are generally okay, though we need to delete the first byte from every (except first packet), (the content-ranges mesh with each other with 1 byte) and there are some unnecessary packets at the end.

We solve the first problem with a quick script in bash:

for file in `ls extractedFiles` done
	tail -c +2 $file > ../output/$file;
done

The only thing that's left is merging the files together, we simply do that with cat * > out

We're left with a password-protected zip that has out flag.png in it.

Another interesting thing is that requests for the zip are made with an interesting User-Agent:

screen2

We extract the packets using the same techinque as in the first step and are left with a file of base64 encoded strings(be careful to ignore retransmissed packets)

Finally, by writing our own script (or just using an online tool like this one) we convert our strings to an image:

out

Using it to open the encrypted zip we get:

flag

There you go!

Bonus pic, guessing the flag was not a fun part of the challange:

guessing

###PL version