Skip to content

The Silent Exfiltration - Solve CTF Challenge

Using wireshark to analyze

image-20260322172537454

I found out that this pcap file captured mostly TCP and HTTP protocol. So I filter only the http protocol and found out a very interesting traffic.

53144   114.784612  192.168.163.137 192.168.163.160 HTTP    210 GET /admin/flag.zip HTTP/1.1 
53147   114.785856  192.168.163.160 192.168.163.137 HTTP    285 HTTP/1.0 200 OK  (application/zip)

image-20260322173120856

Export the packet bytes, I have the flag.zip. But it is password protected so I have to find the password inside this pcap file

➜  The Silent Exfiltration: 7z l flag.zip

7-Zip 25.01 (x64) : Copyright (c) 1999-2025 Igor Pavlov : 2025-08-03
 64-bit locale=C.UTF-8 Threads:8 OPEN_MAX:1024, ASM

Scanning the drive for archives:
1 file, 219 bytes (1 KiB)

Listing archive: flag.zip

--
Path = flag.zip
Type = zip
Physical Size = 219

   Date      Time    Attr         Size   Compressed  Name
------------------- ----- ------------ ------------  ------------------------
2026-02-03 15:14:37 .....           27           47  flag.txt
------------------- ----- ------------ ------------  ------------------------
2026-02-03 15:14:37                 27           47  1 files
51985   77.435278   192.168.163.160 192.168.163.137 HTTP    273 HTTP/1.0 200 OK 

I check the data of this traffic and fount out the message: The secret zip hash that I should delete: e85a3b267e94f3721117fc7ac54fbeba

I check the hash online and the result is: e85a3b267e94f3721117fc7ac54fbeba:Letmein!

So the password of the zip file is: Letmein!

The flag is: FIA{cy83r_k1ll_ch41n_huh?}