CTF challenge. How to receive full flag using netcat?

0

Im trying to dip my toes a bit more into networking, pentesting etc and i might have a slightly vague question but i hope one of you are able to help

I'm trying to poke at a CTF that were made by some people i know. And i have reached this task that basically says "This website is giving out a free flag! However they are being disrupted by hackers so we cannot aquire the whole flag, maybe you can try, youre gonna need a shark"

Obviously i realize needing a shark means using wireshark. The task also points to their website and port i have to use with netcat. As i do that only a couple of letters get sent to me, which is for sure the start of the flag.

Taking a look at wireshark reveals to me that after those 3 letters i recieve a RST packet and the connection closes, any ideas on how to retrieve the complete flag? Or just hints at what i should try doing, cause ive been looking for a while to see if theres anything that might work

DISCLAIMER, this CTF is not a competition or anything like that, it is just a for fun CTF challenge

Imgur link for wireshark image. Different colored cross-outs are different IPs, besides the domain name

Enoxisabru

Posted 2019-12-23T14:57:02.223

Reputation: 1

No answers