This doctor is driving me crazy.
As the first challenge, and considering the beginner-friendly nature of this CTF, I designed a simple Wireshark TCP task, with a slight twist to make it just a bit more engaging for newcomers.

Players are expected to open the provided .pcapng file using Wireshark and start following the TCP streams. A conversation unfolds across multiple streams, with each stream revealing a new message. Among these, three messages stand out: one containing a hex sequence, another referencing a key, and finally, the key itself.
Encrypted flag (hex): 3400171418060C0211071A2B15070A081B141812
Key: getajob
By plugging the hex string and the key into an XOR decryption tool (e.g., dcode.fr), or by writing a quick script, players will discover that this is a simple repeating-key XOR.
Flag: Securinets{Azemmour}