kashiCTF 2026 - Mid Forensics
A forensics challenge involving network traffic analysis and IP Time-to-Live (TTL) steganography.
Challenge Description
A packet capture was collected from an internal network segment during routine monitoring. No alerts were triggered at the time, and the traffic appears largely normal. Your task is to analyze the capture and determine whether any meaningful information can be recovered.
Initial Analysis
The provided file ttl_stego.pcap contains a series of
ICMP Echo (ping) requests. While the payloads appear standard, the IP
Time-to-Live (TTL) values fluctuate between 64 and
65, suggesting binary data is encoded in these
variations.
Using tshark to inspect the TTL values:
1 | tshark -r ttl_stego.pcap -c 10 -T fields -e ip.ttl |
Extraction & Decoding
The TTL values can be mapped to binary bits: - 64
→ 0 - 65
→ 1
We can extract the full sequence of TTLs and decode them using a Python script:
1 | import sys |