Kita_narcos -
[Insert the challenge description here, e.g., "The narcos are communicating using a secure channel. Break their encryption to find the flag."] 2. Reconnaissance & Analysis
[Describe what you found: a URL, a PCAP file, a zip file, etc.] Methodology: Examined the provided file using file command. Checked website source code for comments. kita_narcos
[Example] Analyzed the traffic using Wireshark and noticed a suspicious POST request to /login . [Insert the challenge description here, e