Level 2 - Dee Na Saw as a need
Last updated
Last updated
We have detected and captured a stream of anomalous DNS network traffic sent out from one of the PALINDROME compromised servers. None of the domain names found are active. Either PALINDROME had shut them down or there's more to it than it seems.
This level contains 2 flags and both flags can be found independently from the same pcap file as attached here.
Flag 1 will be in this format, TISC{16 characters}.
We are provided with a PCAP capture containing some suspicious DNS traffic.
The DNS queries follow the format d33d<2 numbers><7 characters>
After some analysis, I found that the 2 numbers ranged from 0 to 64. This would be base-64 encoding. Some scripting would help us to recover the encoded content.
It turns out the output was a Microsoft Word document.
Since these documents are essentially zip files, I unzipped the Word document and did a recursive grep for the flag: grep -r "TISC" .
In theme1.xml
lies the flag.
The 2nd part (7 characters) comprised of upper case alphabets and numbers. This was base-32 encoding. The flag was hidden in the decoded output.