Skip to the content.

Incident reporting (4 points)

Hi, TCC-CSIRT analyst,

our automatic incident recording system has captured about an hour of traffic originating from the IP range within the AI-CSIRT constituency. Analyze whether there are any incidents present and report all of them through the AI-CSIRT web interface.

See you in the next incident!

Hints

Solution

We can use Wireshark to analyze the extracted pcap file. Since the AI-CSIRT web interface requires UTC times when submitting the data, it is important to switch the display setting accordingly (View -> Time Display Format -> UTC Date and Time of Day).

Then we just need to analyze the provided data to find 4 incidents. After submitting each of the reports, the AI-CSIRT web interface yields 1/4 of the FLAG.

Incident 1: Brute force attack

Wireshark filter: http && ipv6.src == 2001:db8:7cc::a1:210 && ipv6.dst == 2001:db8:7cc::acdc:24:beef

AI response:

{"message":"It's probably a real incident, I'll consult the natural intelligence of a member of the CSIRT."}

Your incident ID is MS80OiBGTEFHe2xFOA==, please keep it.

$ echo MS80OiBGTEFHe2xFOA== | base64 -d
1/4: FLAG{lE8

Incident 2: (D)DOS

Wireshark filter: http && ipv6.src == 2001:db8:7cc::a1:d055

AI response:

{"message":"It's probably a real incident, I'll consult the natural intelligence of a member of the CSIRT."}

Your incident ID is Mi80OiBzLVVrb3g=, please keep it.

$ echo Mi80OiBzLVVrb3g= | base64 -d
2/4: s-Ukox

Incident 3: Scanning

Wireshark filter: ipv6.addr == 2001:db8:7cc::a1:42

AI response:

{"message":"It's probably a real incident, I'll consult the natural intelligence of a member of the CSIRT."}

Your incident ID is My80OiAtYTBRZi0=, please keep it.

$ echo My80OiAtYTBRZi0= | base64 -d
3/4: -a0Qf-

Incident 4: Web service enumeration

Wireshark filter: http && ipv6.addr == 2001:db8:7cc::a1:210 && ipv6.addr == 2001:db8:7cc::acdc:24:a160

AI response:

{"message":"It's probably a real incident, I'll consult the natural intelligence of a member of the CSIRT."}

Your incident ID is NC80OiBkNWtNfQ==, please keep it.

$ echo NC80OiBkNWtNfQ== | base64 -d
4/4: d5kM}

Summary

If we combine all four parts we get FLAG{lE8s-Ukox-a0Qf-d5kM}.