Finding Hidden data from a UDP packets destination port
Jadi
A clever and fun idea in the Elbonia Challenge from PatriotCTF 2023. We have a pcap file which contains a hidden message. In the beginning I will examine it using WireShark and after finding the clue (and a few reroutes I will describe in the video) will extract the flag using the scapy python library and IDLE.
00:00 - Patriot CTF 2023 Elbonia description 02:27 - A few words about Warp Terminal 03:55 - Examine the PCAP using Wireshark 10:45 - Using Scapy to work with the PCAP UDP data 15:55 - Getting the Flag from dport data
Find the original pcap file here: https://github.com/jadijadi/ctf/tree/main/2023/PatriotCTF/Elbonia With a shoutout to Patriot CTF guys: https://pctf.competitivecyber.club/ ... https://www.youtube.com/watch?v=XewwjB0AWVA
91948883 Bytes