Search for a command to run...

This time, the server is even more secure, but did it actually receive the secret? Simple brute-force won't work!
strings -n 4 files/capture.pcap | grep -E "^[0-9a-f]{64}$"
enc_user = 19574ac010cc9866e733adc616065e6c019d85dd0b46e5c2190c31209fc57727quad = 0239bcea627d0ff4285a9e114b660ec0e97f65042a8ad209c35a091319541837dec_client = 4b3d1613610143db984be05ef6f37b31790ad420d28e562ad105c7992882ff34quad = E_{k4}(E_{k3}(enc_user)).x: mid = E_x(enc_user); store in a map.y: compute left = D_y(quad) and look up in the map.(k3, k4).dec_client = D_{k1}(D_{k2}(quad)) β E_{k1}(dec_client) = D_{k2}(quad).y: right = D_y(quad).x: left = E_x(dec_client) and match to right.(k1, k2).message = D_{k1}(D_{k2}(enc_user)).server.py, flag is message + k1 + k2 + k3 + k4 (keys as 2 bytes each).k1 = b'e4', k2 = b'b3', k3 = b'f8', k4 = b'd}'scriptCTF{s3cr37_m3ss4g3_1337!_7e4b3f8d}