strange-pcap
Category
Forensics
File
Strange.pcapng
Challenge Overview
This challenge is about analyzing carefully a .pcapng file.
My usual approach when analyzing a .pcapng file is to start with basic file inspection commands:
file Strange.pcapng
exiftool Strange.pcapng
binwalk Strange.pcapngIt seems that binwalk found a protected zip archive named flag which contains flag.txt. Unfortunately it cannot be cracked with tools like John or Hashcat so it must be a way to unzip it.
I retrieved the archive using:
binwalk -e Strange.pcapngTraffic Analysis
Opening the file using wireshark we see that we've got a lot of USB captures. I tried some exfiltration combinations and one of them was usbhid.data.
Note: HID (Human Interface Device) is a device-class protocol used over USB or Bluetooth that standardizes communication between human-interface devices (e.g., keyboards and mice) and a host computer.
The moment that I saw HID I was thinking directly about the password that we need to extract the flag.
I extracted all those packets using:
(This command filters out short (noise) entries and formats the remaining USB HID data into xx:yy byte notation, preparing it for script-based analysis).
HID Decoding
I used the following script to convert the captured HID data into plaintext.
With this password we can extract the content of the archive (flag.txt).
made by k0d
Last updated