Digital Camouflage
40 points Medium

We need to gain access to some routers. Let's try and see if we can find the password in the captured network data: https://mega.nz/#!XDBDRAQD!4jRcJvAhMkaVaZCOT3z3zkyHre2KHfmkbCN5lYpiEoY Hint 1: It looks like someone logged in with their password earlier. Where would log in data be located in a network capture?<br /> Hint 2: If you think you found the flag, but it doesn't work, consider that the data may be encrypted.

Credit: picoCTF 2017

Flag
Rating 4.21
5
4
3
2
1

Discussion

Extract readable txt from pcap file - strings data.pcap | less : Extracts all human-readable txt from binary file

Search login-related data - strings data.pcap | grep "<userid\password>"

: Username: _ Password (encoded): _ The ___ at the end is URL encoding for ==

Decode (terminal/analyzer tool) - echo " " | base64 -d

Last part; pls use your brain

0

ligma

0

ligma

0

ligma

0

ligma

0
Protected
0
Protected
0
Protected
0
Protected
0
Protected
0

Wow I got juked thinking it is required to capture a flag

0