ctf-writeup/2023/RITSEC CTF 2023/Web of Lies
daffainfo e6c48e50f1 feat: grouped the challs 2024-01-09 16:59:32 +07:00
..
images feat: grouped the challs 2024-01-09 16:59:32 +07:00
README.md feat: grouped the challs 2024-01-09 16:59:32 +07:00
weboflies.pcapng feat: grouped the challs 2024-01-09 16:59:32 +07:00

README.md

Web of Lies

We found more weird traffic. We're concerned he's connected to a web of underground criminals.

About the Challenge

We were given a pcapng file (You can download the file here). And here is the preview

preview

There are a lot of requests to /flag and /fl4g endpoints

How to Solve?

As there were only requests to the /flag and /fl4g endpoints, I decided to represent them in binary code. Therefore, /flag is equivalent to 0 and /fl4g is equivalent to 1.

tshark -r weboflies.pcapng -Y http | grep -oP "/fl.* HTTP" | sed 's/\/flag.*/0/g' | sed 's/\/fl4g.*/1/g' | tr -d '\n'

To easier myself, im using tshark command to print all the HTTP packet, and then change them to binary code using sed command

tshark

Use binary code translator to obtain the flag

flag

RS{Refr3shTh3P4g3}