Portobello-53-Depression
Part 1 – PunnyCode
After noticing multiple xn--
CNAMES in the PCAP, I narrowed down to host 9 and observed many of these entries.
After removing the excess and focusing on the head before it turns into junk, you can grab the first 6 sections to toss into the punycode converters:
tcpdump -nr portobello53.pcapng 'src fd00:6e73:6563:3232::9' | cut -d " " -f 8- | cut -d "." -f -1 | egrep xn-- | head
tcpdump -nr portobello53.pcapng
reads the packet capture file.'src fd00:6e73:6563:3232::9'
filters packets with the source IP addressfd00:6e73:6563:3232::9
.cut -d " " -f 8-
extracts the relevant fields from the packet data.cut -d "." -f -1
removes the domain suffix.egrep xn--
filters for entries containingxn--
.head
limits the output to the first 6 entries. (You will eventually use all lines, this is just a starting point.)
FLAG-ART-SCREENSHOT-IS-DIGITAL-THEFT
Flag submission:
Portobello 53 - Depression (1/3) | 2 | The Mycoverse needs its own flag (1/3)
Forum message:
The user found a way to exfiltrate information using country flags? Where can I get a certification for this?
Part 2 and 3 are from Other Write-ups
According to another write-up, using the following command achieves something similar to my approach in Part 1. If I had found a better converter, I might have seen the pattern the whole file was making. Below is my version for extracting just the xn--
entries, even though a few were broken. I also include the decoded output via an ini file.
My Version for xn--
:
tcpdump -nr portobello53.pcapng 'src fd00:6e73:6563:3232::9' | cut -d " " -f 8- | cut -d "." -f -1 | egrep "xn--" > punycode.log
tcpdump -nr portobello53.pcapng
reads the packet capture file.'src fd00:6e73:6563:3232::9'
filters packets with the source IP addressfd00:6e73:6563:3232::9
.cut -d " " -f 8-
extracts the relevant fields from the packet data.cut -d "." -f -1
removes the domain suffix.egrep "xn--"
filters for entries containingxn--
.> punycode.log
saves the output to a file namedpunycode.log
.
Write-up Version:
tshark -r portobello53.pcapng | grep libera | grep "query 0x" | awk {'print $12'}
tshark -r portobello53.pcapng
reads the packet capture file.grep libera
filters packets containing the word “libera”.grep "query 0x"
filters packets that contain the phrase “query 0x”.awk {'print $12'}
prints the 12th field of each packet, which contains the subdomain.
Either way, decode here: https://www.punycoder.com/
Part 2 reads:
FLAG-ART-MUSHROOM-ARE-HIDDEN-IN-PLAIN-SIGHT
See below for before and after – PART 3 is the QR Code.
QR Code:
FLAG-ART-EXFIL-METHOD-IS-TRUE-MASTERPIECE
If you can’t scan it, you might have to make it bigger and fix the black-to-white ratio since it isn’t picking it up correctly.