misc-traffic analysis

In the end it turned out to be quite simple

Find the key, import, filter, get flag.

At the beginning, I was confused by a compressed package and kept saying that the end of the file was missing.

Finally, I have an idea, is there something in the data packet that has not been extracted?

Here, follow TCP

I found that base64 and the mentioned image001.png were not solved online at the beginning, so I wrote a code to try to solve it.

import base64

txt = open("misc.txt","r")

png = open("misc.png","wb")

bin_png = base64.b64decode(txt.read())

png.write(bin_png)

txt.close()
png.close()

Get a base64 map, and find that this is an RSA key according to the prompt

In the face of this who is not a while Meng! ! ! ! ! ! ! , the whole thing is a problem, scan through qq, and then import it after correcting one by one

After importing, wireshark will automatically decrypt, enter http in the filter, follow the flag and it will come out

 

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=326832152&siteId=291194637