Siunam's Website

My personal website

Home About Blog Writeups Projects E-Portfolio

Blue Baby Shark

Overview

Background

Find the flag

In this challenge, we can download a file:

┌[siunam♥earth]-(~/ctf/VU-Cyberthon-2023/Network-Security/Blue-Baby-Shark)-[2023.02.25|15:54:42(HKT)]
└> file Blue\ Baby\ Shark.pcapng 
Blue Baby Shark.pcapng: pcapng capture file - version 1.0

It’s a packet capture file!

Let’s open it in WireShark:

┌[siunam♥earth]-(~/ctf/VU-Cyberthon-2023/Network-Security/Blue-Baby-Shark)-[2023.02.25|15:55:32(HKT)]
└> wireshark Blue\ Baby\ Shark.pcapng

Let’s look at the “Protocol Hierarchy” in “Statistics” tab:

In here, we see there are 3 protocols: Dropbox LAN sync Discovery, TCP, ICMP.

The Dropbox protocol looks very interesting, as sometimes bad actors will use Dropbox to host their C2 (Command and Control) infrastructure:

Hmm… No idea what we can do with that at the moment.

In the bottom of the packet capture, I saw that very sussy data.

Let’s follow it’s TCP stream:

Oh! Looks like we found some commands traffic’s data!

When you scroll down, we can see the flag:

Conclusion

What we’ve learned:

  1. Analyzing How A Bad Actor Infiltrate A System Via Inspecting Packets In WireShark