5Charlie CTF - Covert-Channel - Busy Day
A write-up of the “Busy Day” network covert-channel pcap analysis challenge from 5Charlie CTF.
Busy Day
Busy Day - Challenge
Just a normal day at the office. Get to work looking at that useless traffic!
Attachments: traffic.pcapng
- Packet Capture
Busy Day - Solution
Opening the packet catpure we see a lot of traffic, most of it unrelated to the task at hand. It took me a while, but I eventually noticed a TCP RST that didn’t have any preceding traffic.
I filter on the destination IP address and, bingo, that’s lookin’ awfully strange.
After the filter is applied, I like to hold the up and down arrow key for a moment to scroll back and forth and get an idea of which fields are changing between the packets. I notice the TCP sequence field is changing, which is normal. However, they’re not changing sequentially and I notice that the first byte starts spelling out a letter of “flag” for each packet.
We can then write up a quick tshark and inline-python one-liner to pull our flag.
Flag: flag{BouncinPackets!}