E-CTF-2025 - Forensic


Challenge Description Link to heading

Screenshot

We are provided with a .zip file containing a .pcap file. The instructions indicate an image has been stolen, and we must recover it from the PCAP file.


Step 1: PCAP File Analysis Link to heading

I opened the .pcap file with Wireshark to inspect the network traffic.

Screenshot

Observations:

  • I noticed suspicious DNS requests sent to data.exfil.attacker.com.
  • This suggests data exfiltration via DNS by encoding the image within domain names.

Step 2: Extracting Exfiltrated Data Link to heading

To extract all DNS queries from the PCAP, I used Tshark:

tshark -r justapcap.pcap -Y "dns" -T fields -e dns.qry.name > dns_exfil_data.txt

Explanation:

  • -r justapcap.pcap → Analyzes the justapcap.pcap file.
  • -Y "dns" → Filters only DNS requests.
  • -T fields -e dns.qry.name → Extracts only domain names from DNS queries.
  • > dns_exfil_data.txt → Saves the output into a text file.

Result:

Screenshot


Step 3: Cleaning and Reconstructing Data Link to heading

The data sent via DNS appeared to be hexadecimal-encoded. I used cut and xxd to reconstruct the stolen file:

cat dns_exfil_data.txt | cut -d'.' -f1 | xxd -r -p > extracted_file

Explanation:

  • cut -d'.' -f1 → Removes the indices and the .exfil.attacker.com domain, leaving only the hexadecimal.
  • xxd -r -p → Converts hexadecimal to binary.
  • > extracted_file → Stores the reconstructed file as extracted_file.

Step 4: Checking and Opening the Image Link to heading

I verified the extracted file type using the file command and opened the image:

file extracted_file

Result: The recovered image was indeed a PNG file!

Retrieved Flag: Flag found