Briefing
Greetings, Special Agent.
One of our field agents in Malaysia managed to physically breach the office of a corrupt politician. Doubling as a mole for a Chinese criminal enterprise, mostly smuggling endangered animals. In this case their evil business involves shark fin trade and other exotic food items. During the breach, our agent successfully obtained several pieces of information on the organization. Currently this does not include their name, as they only communicate using anonymous messages and codenames. We hope that the information, which includes pictures, floorplans, data dumps and packet captures. Will lead to a more complete picture of this organization. We know that the Malaysian government will be exceptionally happy to get this criminal enterprise out of its borders. All data has been divided over several agents. Your segment for this contract is the analysis of a packet capture file. Figure out what is being communicated and find the message that matters.
As always, Special Agent, the contract is yours, if you choose to accept.
Materials
Answer Instruction
Use the answer to unlock the flagfile, this will reward you with your badge.
The shortened link is the answer.
Flagfile
Be advised, the flagfile is an encrypted ZIP. Make sure your OS supports the ZIP format. Ensure the password contains no hidden characters or formatting, paste in Notepad first if the password doesn’t seem to work.
PS: Don’t forget to claim your Coins and XP, by posting your card in the #card-brag channel in Discord.
Official Write-up
Provided here is the official write-up, it does contain the answer. Use this if you’re stuck, or want to verify if you got the answer correct.
โ ๏ธ SPOILER: Official Write-up
On the Wire
This challenge involves analyzing a packet capture file obtained from a Malaysian politician’s office, who is involved with a Chinese criminal enterprise trafficking in endangered animals. The goal is to discover hidden communications within the network traffic.
Available Materials
- Packet capture file (with modified extension)
- Context about illegal wildlife trafficking operation
- Information about anonymous messaging system
Solution Path
Step 1: Initial File Analysis
- Identify the packet capture file despite modified extension
- Open the file using appropriate tools:
- Wireshark
- tcpdump
- Network Miner
- Other pcap analysis tools
Step 2: Traffic Analysis
Key areas to examine:
- DNS queries
- Specifically look for NSLOOKUP commands
- Focus on external communications
- Look for unusual domains or IPs
- Track DNS resolution requests
Step 3: Discovering the Pastebin
The packet capture contains an NSLOOKUP to:
https://pastebin.com/raw/U7zb8Kyh
Step 4: Final URL
The Pastebin content leads to the bit.ly URL that serves as the password:
https://bit.ly/3qyrf7t
Required Tools
- Packet Analysis Software:
- Wireshark (recommended)
- tcpdump
- NetworkMiner
- Text editor for examining extracted content
- Web browser for accessing discovered URLs
Common Pitfalls to Avoid
- Missing the modified file extension
- Overlooking DNS queries
- Not following the complete chain of URLs
- Missing the raw pastebin URL format
- Incorrect URL copying
Analysis Methodology
- File Examination:
- Verify file type regardless of extension
- Open with appropriate analysis tool
- Traffic Analysis:
- Filter for DNS traffic
- Look for NSLOOKUP commands
- Examine external communications
- URL Chain:
- Follow Pastebin URL
- Extract bit.ly link
- Verify complete URL format
Verification Steps
Confirm:
- Correct file opening
- Complete DNS query identification
- Proper Pastebin URL extraction
- Accurate bit.ly link copying
- Proper URL formatting
Additional Tips
- Pay attention to DNS traffic
- Look for patterns in communications
- Follow the complete chain of references
- Verify all URLs carefully
- Document findings systematically
Remember: The key to this challenge is methodical analysis of network traffic and careful attention to the chain of references from DNS lookup to final URL.
Creator(s): Frank Diepmaat