Who?

Description

The truth lies with the right one.

Author: Z10UD1

Files

  • host_me.pcapng

PCAP with HTTP requests containing flag parts in URIs.

Solution: Extract HTTP requests to /part/ endpoints:

tshark -r host_me.pcapng -Y 'http.request.uri contains "/part/"' -T fields -e http.request.uri | grep /part/

Flag parts in order:

/part/Spark
/part/{d1d_
/part/y0u_k
/part/n0w_t
/part/h4t_I
/part/c4n
/part/wr1t3
/part/_h3r3
/part/?}

Concatenated: Spark{d1d_y0u_kn0w_th4t_I_c4n_wr1t3_h3r3?}


Last updated

Was this helpful?