We need to gain access to some routers. Let's try and see if we can find the password in the captured network data: https://mega.nz/#!XDBDRAQD!4jRcJvAhMkaVaZCOT3z3zkyHre2KHfmkbCN5lYpiEoY Hint 1: It looks like someone logged in with their password earlier. Where would log in data be located in a network capture?<br /> Hint 2: If you think you found the flag, but it doesn't work, consider that the data may be encrypted.
Credit: picoCTF 2017
HINT/ Guys, u searching about a password, not a flag
3 days ago
Extract readable txt from pcap file - strings data.pcap | less : Extracts all human-readable txt from binary file
Search login-related data - strings data.pcap | grep "<userid\password>"
: Username: _ Password (encoded): _ The ___ at the end is URL encoding for ==
Decode (terminal/analyzer tool) - echo " " | base64 -d
Last part; pls use your brain