Skip to content

Latest commit

 

History

History

Suspicious Traffic

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

Lost at Sea

  • Download the PCAPNG file.
  • Using Wireshark analyze it.
  • After follow HTTP requests we shall understand that the Flag is present Byte by Byte.
  • So I have made a Scapy script for extracting them.
from scapy.all import *
a=rdpcap("capture.pcapng")
z=""
for i in a:
	b=""
	for j in i:
		b=b+str(j)
	if(len(b)==46 or len(b)==282):
		z=z+b[-2]
print(z)
Flag --> WPI{su3p1ci0uS_htTp}