writeups
SilentStream
By inspecting the provided PCAP, we can see that it only contains TCP traffic, and that each packet includes a data field.
We can extract the payloads using: tshark -r packets.pcap -T fields -e data > output
The provided program reads a file and encodes each byte using the encode_byte function, which takes a key as an argument. Here, the key is 42.
encode_byte:return (byte + key) % 256


