See frame nΒ°134 GET /corporation/secret HTTP/1.1.
Extract the file (File > Export Objects > HTTP).
Check the type of file:
Unzip it:
Ok, there is a pasword, let's check the html page: frame nΒ°149 GET /corporation/arsenal.html HTTP/1.1.
Extract it from the pcapng.
See the hint: For H.i.n.t: Referring to arsenal, i remember a number. It also length of secret p.a.s.s.w.o.r.d.
One key event is:
30 October: Arsenal recorded victory in the League Cup to a record-breaking 7β5 scoreline at the Madjeski Stadium, having been 4β0 down initially. The game had the most goals ever scored in a single League Cup match (12).
With luck and guessing I found this number was 4.
So now let's try to crack the zip password with fcrackzip:
Extract the zip with the password.
Check what file type EasyExtrack is:
Try to unzip it with the same password:
Here are all the flags:
Flags are not hashes because they are 33 char long. But we can see there is one non-hex char in each flag.
Remove each non-hex flag to get 32 char long MD5 hashed:
The extracted wrong letters are (in order): xthuynhxxxpxxxxxxxxsiphonuukjl.
Unformated flag is: Flag{brFFFfFFFFFFFFl_help_you}.
SHA1 the unformated flag:
Format the flag: WhiteHat{e7643ccd180c84176ae0b4361c3b169fceacf961}.
Not the good flag ...
Note that 800618943025315f869e4e1f09471012 is the right md5 hash for F and d2a33790e5bf28b33cdbf61722a06989 is the wrong md5 hash for F that you can obtain with non POSIX tools like echo (that's why I use printf). So only hashkiller knows both wrong and right hash, all other md5 decrypt online tools knows only the right one so they are not able to decrypt d2a33790e5bf28b33cdbf61722a06989. But anyway...
You know what? After some wasted hours I figured that I needed to replace F with some guessed letters: Flag{bruteforce_will_help_you}. Yes guessing again.
SHA1 the unformated flag:
Format the flag: WhiteHat{1e71b26aa01733cd13e5199386c70fe31df43deb}.
Not the good flag ...
Description said Submit: WhiteHat{SHA1(flag)}, it depends if flag means Flag{xxx} or xxx.
SHA1 the unformated flag:
Format the flag: WhiteHat{31bd8aa56447ea1c703d0943e175a06a5c4ee614}.
This time this is the good one.
Here was my ruby script:
Note: CTF orga team should test challenges and remove the crappy ones before let teams have pain with them.
And we also get one of the 23 parts of the puzzle:
This is for the Discovering Vietnam bonus challenge. It is a puzzle of 23 parts, you need them to get a QR-code that give a flag. Flag will give 10% bonus points of the current score.
I think we need to do almost all challenges to get all the pieces.