Tags: pcapng forensics wireshark
Rating:
# BIRDTHIEF: Interception
#### Category : Forensics
#### Points : 200(46 solves)
#### Author : f1rhaz4rd
## Challenge
Read the slide deck for more information
Flag format RITSEC{}
F1rhaz4rd
Attachments :
+ BIRDTHIEF.pdf
+ interception.pcapng
## Solution
Open the capture in wireshark and then right click on a TCP protocol capture->Follow->TCP Stream.
Going through the stream one by one, in stream no. 30 we can see someone tries to log into the drone with username `pilot` and a base32 encoded password, which after decrypting becomes `ritsec`.
If we see below that, we can see that the user executes a command
`cat droneinfo.log`
which outputs another base32 string.
Decoding this string, we get the flag:
`RITSEC{Dr0n3_ar3_rea11y_c00l}`
[Original Writeup](https://github.com/p1xxxel/ctf-writeups/tree/main/2021/RITSEC/BIRDTHIEF:%20Interception)
(https://github.com/p1xxxel/ctf-writeups/tree/main/2021/RITSEC/BIRDTHIEF:%20Interception)