No cON Name CTF Finals 2014
02.11.2014 22:37, by Dor1s
Description: Does it sound like a flag? Maybe... I don't know...
Let's quickly analyze the file:
01.11.2014 22:13, by the_storm
Description: We were given a pcap file called vodka were asked to get out the flag.
We opened the pcap file with wireshark and take a look the statistics of the pcap file, we saw that 100% of the packets in the file was mainly tftp protocol packets.
01.11.2014 05:00, by Dil4rd
Description: Connect to the service listening at 10.210.8.1:6969 and get the flag.
Solution: We have x86 ELF binary (attached to this writeup). If you open it in disassembler, you will find that it's obfuscated, but strings aren't encrypted: