Skip to main content
You are my Special 1 - CTF Writeup
  1. Writeups/
  2. CyberSummit V4.0 - CTF Writeups/
  3. Special/

You are my Special 1 - CTF Writeup

·413 words·2 mins·
Deadnaut
Author
Deadnaut
Documenting cybersecurity challenges, CTF writeups, and penetration testing insights from the digital frontier.
Table of Contents

Challenge Name: You are my Special 1
Category: Special CTF: CyberSummit V4.0 CTF
Description: Yuji ate the onigiri, eyes narrowing. Not over yet. He focused his cursed energy. “Secret Technique: Sniff Local Network.” Energy rippled through the dorm Wi-Fi, locking onto Inumaki’s device. Yuji saw activity but was truly astonished as he saw something quite peculiar. Whatever Inumaki was looking up… it was definitely for round two.


Initial Recon
#

We’re handed a PCAP file: tuna.pcapng. No context, no hints—just a file and a vague description referencing the previous challenge. Time to fire up Wireshark and see what we’re dealing with.

PCAP in Wireshark

The Protocol Discovery
#

After loading the PCAP, I start filtering and analyzing the traffic. The packets are interesting—not your typical web traffic or standard protocols. After some inspection, I notice something peculiar: Quake3 protocol.

This is uncommon. Why would a CTF challenge include a game protocol? And more importantly, the traffic is all directed to a specific IP: 128.251.227.72.

Quake3 protocol traffic

At this point, I’m thinking: What game uses Quake3? What’s the connection?


Connecting the Dots
#

Then it clicks. The previous challenge was You are my Special 0. What game did we identify there? Wolfenstein Enemy Territory—a classic game that uses Quake3 as its underlying network protocol.

So we have:

  • A PCAP showing Quake3 traffic
  • Traffic directed to 128.251.227.72
  • Knowledge that this relates to Wolfenstein Enemy Territory

The challenge is becoming clearer: someone connected to a Wolfenstein ET server, and we need to figure out what they found (or what we can find) on that server.


The Unconventional Move
#

Most CTF challenges involve reversing, exploiting, or analyzing. This one? This one wanted us to think differently.

If the server is still running at 128.251.227.72, why not actually connect to it? Download Wolfenstein Enemy Territory and try connecting to that server ourselves.

Wolfenstein ET

The Breakthrough
#

After installing the game and connecting to 128.251.227.72:

conneting to server

I launch into a map. And there it is—the moment you load in, the flag appears on your screen.

flag in game

Sometimes the simplest solution is right in front of you.

CyberTrace{W3lC0M3_t0_My_H1dd3n_d0m4in}

Tools Used
#

  • Wireshark - Network packet analysis and protocol identification
  • Wolfenstein Enemy Territory - The game client (free and open-source)

Takeaway
#

This challenge teaches an important lesson: context is everything. The connection to the previous challenge wasn’t just flavor—it was the key to solving this one. And sometimes, the most “hacker-like” thing you can do is think creatively about how systems actually work in the real world.

Related