

Wireshark not only can build files that have been capturedīut Wireshark can also rebuild audio communications such as VOIP or RTP Figure 13 – Decrypted Pumpkin Task five: “Extract the RTP stream. Of figure 1) expanding the “Hypertext Transfer Protocol” we can see the file-size. The HTTP Stream we see another pumpkin! Looking at the packet section (number 2 We see that a file named “michael.txt” is requested, following As the traffic is SSL, we can assume we can search for traffic flows using Add the file into the (Pre)-Master-Secret Log filename Copy the “CLIENT_RANDOM” into a text file then navigate to: Edit -> Preferences Wireshark can take this encryption key and decrypt Flows captured into readable Inspecting this traffic flow presents anĬLIENT_RANDOM refers to the encrypting SSL communications, With the Wireshark pcap file under Statistics -> Conversations we can see anĮmail connection was made on port 25. Looking at the all the different conversations occurring What the file data size of this next pumpkin (in bytes)?” Figure 11 – Task Three Pumpkin Task four: “Find the pre-master token and decrypt What’s the main character that makes the pumpkin up?“įor this task a simple Wireshark filter of TCP port 666 can be used, creating a filer of “tcp.port = 666” and then following the TCP stream will reveal the pumpkin. Is another piece to the puzzle, how does the script know what decoder to use? LookingĪt the “encode” function we can see it adds a value of the selected cipher toįigure 10 – Pumpkin Image Location Task three: “Find the pumpkin that on TCP port 666. Now we have our 3 ciphers decoded ready to decode data. In this case the encoding script shifts a value of “3”, to reverse this shift the method back “-3”. Caesar cipher takes the alphabet and shifts it a given value like the ROT13 method.Base64 cipher has been provided with the encode and decode function of the package because of this the actual encoding and decoding is handed off to a third-party package we can simply change this to “b64decode”.ROT 13 is a cipher involving moving a character 13 places along for example the letter “A” will be replaced with the letter “N” As there is are 26 letters within the alphabet then this cipher does not need to change.This code and let’s look and changing each of the encoding functions to Notice within theĬode there is a list for decryption ciphers defined by commented out.
