BashCrash3rs

ångstromCTF - MISC - Shark 2

In this continuation to the Shark 1 challenge, this one will also focus on analyzing packet capture files.

This description for this challenges is as follows…

Shark 2 Chall

Looks like their friend hasn’t learned to safeguard their traffic better. Let’s download the .pcapng file that is linked in the description and take a peek at what we have.

 

Open the file with wireshark–>

shark2

data filter

follow stream 2

 

Exporting the data –>

ASCII

 

That shark has our flag –>

shark 2 flag