Phreaky

Personal Rating: Easy

We have a pcap file

I identified tcp stream 0 to include just a ubuntu update, so I filtered it out with tcp.stream ne 0

What remains is mostly SMTP packets in several streams

Password: S3W8yzixNoL8

Following one of the streams we find a zip file as it seems

There were 15 streams. I copied all of the relevant data to a text file and cleaned it up like so:

Then I wrote a python and sh script that handles the base64 and passwords etc. finally concatenate them to the finished pdf file:

decoder.py

concat.sh

The final PDF contained the flag.

HTB{Th3Phr3aksReadyT0Att4ck}

Last updated