Forensics: PCAP Stego
- Category: Forensics
- Difficulty: Medium
- Goal: Inspect network traffic to recover a hidden message.
Scenario
A suspicious employee is exfiltrating secrets. You obtained a packet capture. The attacker hides data using an innocuous protocol field pattern.
Task
- Look for repeated small HTTP GET requests with odd query parameters.
- Reassemble data from the
X-Noteheader values in order. - Decode any layered encodings to obtain the flag.
Hints
- Try Wireshark display filters on HTTP traffic.
- Are the values Base64? Maybe hex? Sometimes both.
- Look for delimiters or indices to reassemble.
Expected approach
- Filter HTTP, export objects or follow streams.
- Concatenate
X-Noteheader fragments in order, Base64-decode to revealflag{pcap_layers_reveal_truth}.
Solution (expand to view)
Show solution
- Apply
httpdisplay filter. - Sort by time; locate repeating
X-Noteheaders. - Export headers, join by index, Base64-decode.
- Result:
flag{pcap_layers_reveal_truth}.