# PicoCTF - Wireshark twoo twooo two twoo...
###### tags: `PicoCTF` `CTF` `Misc`
Challenge: [Wireshark twoo twooo two twoo...](https://play.picoctf.org/practice/challenge/110?category=4&page=1)
## Exploit - DNS + sub-domain
1. Statistic
Using statistic to analyze http requests and you'll see that there is `/flag` and `/` in address `18.217.1.57`. Maybe it's a clue or key to find flag

2. String search technique
```bash!
$ strings shark2.pcapng | grep "pico"
picoCTF{bfe48e8500c454d647c55a4471985e776a07b26cba64526713f43758599aa98b}
picoCTF{bda69bdf8f570a9aaab0e4108a0fa5f64cb26ba7d2269bb63f68af5d98b98245}
picoCTF{fe83bcb6cfd43d3b79392f6a4232685f6ed4e7a789c2ce559cf3c1ab6adbe34b}
picoCTF{711d3893d90f100c15e10ef4842abeed3a830f8237c1257cd47389646da97810}
picoCTF{3cf1e22d489fcfb6bb312a34f46c8699989ed043406134331452d11ce73cd59e}
picoCTF{b4cc138bb0f7f9da7e35085e349555aa6d00bdca3b021c1fe8663c0a422ce0d7}
picoCTF{41b8a1a796bd8d202016f75bc5b38889e9ea06007e6b22fc856d380fb7573133}
...
```
You'll find tons of fake flag. Obviously, it's a trap to distract you.
3. Reanalyze the file
I found that there're many DNS request to `{sub-domain}.reddshrimpandherring.com`. Also, I use the filter `http and ip.addr==18.217.1.57` and follow the http stream.

Seems this address is a clue.
4. <font color="FF0000">通靈</font>: Set new filter
payload: set the filter as `dns and ip.dst==18.217.1.57`

You'll see that the sub-domain is a sequence base64 strings. Concate them and decode it, you can fetch the flag. $\to$
`cGljb0NURntkbnNfM3hmMWxfZnR3X2RlYWRiZWVmfQ==` $\to$
`picoCTF{dns_3xf1l_ftw_deadbeef}`
## Reference
[Wireshark twoo twooo two twoo...](https://picoctf2021.haydenhousen.com/forensics/wireshark-twoo-twooo-two-twoo...)