Google CTF 2016 // In Recorded Conversation (25 points)

Capture the Flag, Google CTF 0 Comment 258

This challenge was straightforward. You’re presented with irc.pcap which you open up in Wireshark. Following the TCP stream you’ll be able to find this near the end of the conversation:

PRIVMSG #ctf :so let's do it as a group
:andrewg!~poppopret@agriffiths.c.gctf-2015-admins.google.com.internal PRIVMSG #ctf :CTF{
PING irc.capturetheflag.withgoogle.com
:irc.capturetheflag.withgoogle.com PONG irc.capturetheflag.withgoogle.com :irc.capturetheflag.withgoogle.com
:itsl0wk3y!~poppopret@itsl0wk3y.c.gctf-2015-admins.google.com.internal PRIVMSG #ctf :some_
PRIVMSG #ctf :leaks_
:andrewg!~poppopret@agriffiths.c.gctf-2015-admins.google.com.internal PRIVMSG #ctf :are_
PRIVMSG #ctf :good_
:itsl0wk3y!~poppopret@itsl0wk3y.c.gctf-2015-admins.google.com.internal PRIVMSG #ctf :leaks_
:andrewg!~poppopret@agriffiths.c.gctf-2015-admins.google.com.internal PRIVMSG #ctf :}

 

There it is: CTF{some_leaks_are_good_leaks_}

Leave a Reply

Search

Back to Top