atx0mg's Fortress.

CSAWCTF 2021

Word count: 154Reading time: 1 min
2021/09/13

Forensics

Lazy_Leaks

  • Challenge description

Read More →

Got a pcpa file (Lazy_Leaks.pcap)

  • By Wireshark, I opened the pcap file and found it was about 102.783 seconds record of the packets
  • At first, I tried to find some http stream, but found nothing at all. But between packets, telnet protocal caught my attentions. Because I know telnet protocal is unencrypted, so if the admin used this to log in some server, maybe I can obtain some crendentials.
  • Thus, I mainly focused on TELNET stream, so I filtered “telnet” in Wireshark and found something interesting.
  • I saw some garbage in the packet, however I found there was a packet that was malformed so I started from that spot. Eventually I found the flag just by browsing the unencrypted messages.

CTF results

Place and points

  • We registerd as the ToInfinityAndBeYANd, and got 851 points resulted in 293rd in the ctf.

Categories

  • We solved 11 challenges:.

Score over time

Author:atx0mg

Link:https://jeff14994.github.io/2021/09/13/CSAWCTF-2021/

Publish date:September 13th 2021, 10:33:29 pm

Update date:April 22nd 2022, 5:23:10 am

License:This article is licensed under CC BY-NC 4.0

CATALOG
  1. 1. Forensics
    1. 1.0.1. Lazy_Leaks
    2. 1.0.2. Got a pcpa file (Lazy_Leaks.pcap)
  2. 1.1. CTF results
    1. 1.1.1. Place and points
    2. 1.1.2. Categories
    3. 1.1.3. Score over time