Skip to content

Files

Latest commit

88b0327 · Jul 13, 2020

History

History
11 lines (8 loc) · 353 Bytes

File metadata and controls

11 lines (8 loc) · 353 Bytes

Download and open the pcap file with wireshark.

Check the UDP stream data, packages from 10.0.0.2 looks suspicious.

Using python scap module to load the pcap file.

Concat the raw data from 10.0.0.2 to 10.0.0.13, got a string in flag format, but it saids

  picoCTF{N0t_a_fLag}

Concat the raw data from 10.0.0.2 to 10.0.0.12, got a valid flag