WebNet0
We found this packet capture and key. Recover the flag. You can also find the file in /problems/webnet0_0_363c0e92cf19b68e5b5c14efb37ed786.
- 1.Open in Wireshark
- 2.Go to Edit > Preferences > Protocols > TLS > RSA keys list
- 3.Add the key to the list (don't worry about ip and other columns)
- 4.Flag is in decrypted TLS section of the now visible HTTP packetsHTTP/1.1 200 OKDate: Fri, 23 Aug 2019 15:56:36 GMTServer: Apache/2.4.29 (Ubuntu)Last-Modified: Mon, 12 Aug 2019 16:50:05 GMTETag: "5ff-58fee50dc3fb0-gzip"Accept-Ranges: bytesVary: Accept-EncodingContent-Encoding: gzip*Pico-Flag: picoCTF{nongshim.shrimp.crackers}*Content-Length: 821Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html
picoCTF{nongshim.shrimp.crackers}
Last modified 2yr ago