private-coms

OSCN 2025

Info
Details

Category

Forensics / Network

Challenge Overview

Here we need to analyze a .pcap file. It's not that easy because the capture has 14k packets, and we should check only the things that matter.

I analyzed it and discovered a URB_BULK out packet with 122944 Bytes, which is a lot for a simple packet, so it's sus.

We also could've guessed it using the following Wireshark display filter:

ID3 is the standard header for an .mp3 file, visible in HEX View.

Copying the HEX Dump and going to CyberChef, we get an actual .mp3 file.

Then, going to a speech-to-text tool online or simply listening to the message in the audio, we get the flag.


Final Flag

ctf{13ce08ba071d475d51694c2e60719a1faaa7e13614e5fb9ac43927f43adcb1b}


Alternative

I guess that's not an intended approach, but we could simply run:

This shows we've got an .mp3 file embedded. We can extract it using:

Last updated