Skip to main content
  1. Writeups/

BucketCTF 2023 - Clock

1 min· 0 · 0 ·
misc BucketCTF 2023
Table of Contents
BucketCTF 2023 - This article is part of a series.
Part 1: This Article
Clock>

Clock #

Description>

Description #

One of my cybersecurity professors, Dr. Timely, randomly sent my this file and said if I can decode the message he will give me an A in the class. Can you help me out?

https://storage.ebucket.dev/clocks_medium.pcap

TL;DR>

TL;DR #

In the PCAP file, we have a lot of ICMP requests without any data. We can notice however that they are sent at very precise delays from each other, either 1 second interval or 5 seconds.

Having only 2 states, we can imagine binary. Morse code could also have been a possibility if a third state was present.

Solution>

Solution #

With thsark I get the different deltas between the requests with a field.

I put them in cyberchef to keep only the number of seconds that I want to parse.

Then i replaced 0.1 with 0 and 0.5 with 1 (i had luck it could have been the other way around).

And finally I decode the binary in my recipe to get the flag.

Flag>

Flag #

bucket{look_at_the_times_sometimes}



BucketCTF 2023 - This article is part of a series.
Part 1: This Article