picoCTF - FindAndOpen

Posted on Jan 27, 2026

Someone might have hidden the password in the trace file. Find the key to unlock this file. This tracefile might be good to analyze.

This one was kind of tricky. I opened dump.pcap using Wireshark and found this suspicious packet

alt text

The frame number was 48 so I used tshark for this one

strikingsoul@ramones:~/Downloads$ tshark -r dump.pcap -Y "frame.number == 48" -T fields -e data | xxd -r -p
VGhpcyBpcyB0aGUgc2VjcmV0OiBwaWNvQ1RGe1IzNERJTkdfTE9LZF8=

It seemed like another base64

strikingsoul@ramones:~/Downloads$ tshark -r dump.pcap -Y "frame.number == 48" -T fields -e data | xxd -r -p | base64 --decode
This is the secret: picoCTF{R34DING_LOKd_

Okay cool, the next was to use the first half as the password to extract flag.zip

strikingsoul@ramones:~/Downloads$ unzip flag.zip 
Archive:  flag.zip
[flag.zip] flag password: 
 extracting: flag                    
strikingsoul@ramones:~/Downloads$ cat flag
picoCTF{R34DING_LOKd_fil56_succ3ss_5ed3a878}

Finally, the flag is picoCTF{R34DING_LOKd_fil56_succ3ss_5ed3a878}