2024 HuntressCTF - Keyboard Junkie
2024-10-14

Summary
Author: @JohnHammond
My friend wouldn't shut up about his new keyboard, so...
Steps
This challenge was a pcap file however, of USB traffic not HTTP traffic as i’m use to. I discovered a utility on github call ctf-usb-keyboard-parserto convert the usb data into hex values. I downloaded the file and followed the instructions.
tshark -r ./usb.pcap -Y 'usb.capdata && usb.data_len == 8' -T fields -e usb.capdata | sed 's/../:&/g2'
Next, I used the usbkeyboard.py to extract the keyboard presses resulting in the following:
python3 ./usbkeyboard.py hexdata
so the answer is flag{f7733e0093b7d281dd0a30fcf34a9634} hahahah lol
Flag: flag{f7733e0093b7d281dd0a30fcf34a9634}