Echo Chamber

Author: @JohnHammond#6971 Is anyone there? Is anyone there? I'm sending myself the flag! I'm sending myself the flag!

For this challenge, there was an attached pcap file. Which at first glance seems weird as all the packets are just ICMP packets.

echo_chamber.pcap

So first, I decided to strings it, and see what shows up. Thats when I saw an IEND chunk which usually belongs to a PNG file.

IEND chunk

So i decided to look further and saw that there is a PNG file header inside the pcap file. Now the question is how was i going to extract out the PNG data. Since there were 40 bytes per line and I only needed the first 2, I decided to write a script to take out only the first 2 bytes of each line and write it to a txt file.

Using the above script, I can write 2 bytes of the data of each packet to a text file. However there is a problem with this which I did not realise, there are 2 lines of duplicated data. So I had to write another script to get rid of every alternate line.

After that, I obtain the final extracted_bytes.txt which looks something like this

file-download
47KB

Once i uploaded that to Cyberchef, I obtained the flag

Flag is obtained
Full flag

Thus the flag is flag{6b38aa917a754d8bf384dc73fde633ad}

Last updated