PCAP analysis involves examining captured network traffic to find evidence, credentials, or flags. It's like having a recording of every conversation on the network - you just need to know where to look!
PCAP = Packet Capture. Tools like Wireshark capture traffic into .pcap or .pcapng files. CTF challenges give you captures to analyze for hidden data, credentials, or transferred files.
Wireshark Basics
Start Here
Always check Statistics → Protocol Hierarchy first. It shows what types of traffic exist and helps you focus your search!
Display Filters
HTTP Analysis
HTTP POST requests often contain form data - usernames, passwords, and other sensitive info transmitted in plaintext!
FTP Analysis
DNS Analysis
TLS/HTTPS Analysis
File Extraction
tshark Quick Reference
PCAP Analysis Checklist
Knowledge Check
Key Takeaways
- Check protocol hierarchy first to understand the traffic
- Use display filters to focus on relevant packets
- Export HTTP objects for transferred files
- Follow TCP streams to see full conversations
- FTP and HTTP often contain cleartext credentials
- DNS can be used for data exfiltration - check long subdomains