We have created a classified messaging protocol. reverse the protocol ;-).
we can notice that every packet has different protocol so it have to be something about protocols but after reading a lot about wirshark, packets analyzing i couldn’t find anything useful then i have received some free hints and still have no idea WTF is reversing the protocols
so the CTF ended and i didn’t solve it but
I’ve recently contacted my friend whom solved it and it turns out to be so easy to solve it
so let’s do it.
tshark -r classified.pcap -T fields -e ip.proto > flag and we will get this numbers
ZmxhZ3tFejN5XzJsaW5lc19jT2Rpbmd9