The statement#

In a daring attempt at digital mischief, a crafty threat actor tried to break into Cybertown Tech Solutions’ secure web interface. Their sneaky login attempts were caught red-handed in a PCAP file, thanks to our vigilant network monitoring.

flag format :root@localhost{username_password}

Solution#

The pcapng file has the following string, which contains the username and password. ez win

strings is enough

**Flag: root@localhost{Liam_24_P%40ssw0rd!2024}**

Quirks#

I thought the password (P%40ssw0rd!2024) was meant to be Base64URLdecoded, but the organizers thought otherwise 😅.