Some Traffic
Description
By skyv3il
Our SOC analysts said that in the last few days, some of our employees started to upload a lot of photos on random sites. Check it out.
Flag Format: TFCCTF{...}.
Downloads: sus.pcapng
Solution
Since description mentions uploads of photos, let's extract HTTP objects.
File -> Export Objects -> HTTP
First let's clean up.
└─$ file *
%5c: HTML document, ASCII text
upload: data
upload(1): HTML document, ASCII text
upload(2): data
upload(3): HTML document, ASCII text
upload(4): data
upload(5): HTML document, ASCII text
└─$ for filename in $(/bin/ls); do
if [[ "$(file $filename)" =~ "HTML" ]]; then
rm $filename;
fi;
done;
data
files are actually png files or rather contain images, but there's weird header text and footer, let's also clean them up.
I wrote a small bash script to do this for us. What it basically does is grabs lines from START till END.
#!/bin/bash
file=$1
lines=$(wc -l $file | cut -d " " -f 1)
start=5
end=$(( $lines - 1 ))
sed -n "$start,$end p" "$file" > "$file.png"
After getting proper images I tried to use zsteg and I couldn't find anything. By default zsteg
tries common patterns, let's go boyond that. By using -a
tool tries all known methods.
└─$ zsteg ./upload.png -a | grep TFCCTF
[?] 2 bytes of extra data after image end (IEND), offset = 0x1658d
b8,g,lsb,yx .. text: "FCCTF{H1dd3n_d4t4_1n_p1x3ls_i5n't_f4n_4nd_e4sy_to_f1nd!}TFCCTF{H1dd3n_d4t4_1n_p1x3ls_i5n't_f4n_4nd_e4sy_to_f1nd!}TFCCTF{H1dd3n_d4t4_1n_p1x3ls_i5n't_f4n_4nd_e4sy_to_f1nd!}TFCCTF{H1dd3n_d4t4_1n_p1x3ls_i5n't_f4n_4nd_e4sy_to_f1nd!}TFCCTF{H1dd3n_d4t4_1n_p1x3ls_"
Flag: TFCCTF{H1dd3n_d4t4_1n_p1x3ls_i5n't_f4n_4nd_e4sy_to_f1nd!}
Last updated