Summary: WPA traffic decrypting
Here we have a pcap file with 802.11 (wireless) traffic dump. Seems it’s encrypted, let’s try aircrack:
$ aircrack-ng sciteekadm.cap -w 500-worst-passwords.txt 
Opening sciteekadm.cap
Read 345 packets.
 
   #  BSSID              ESSID                     Encryption
 
   1  40:FC:89:E0:FF:D3  Sciteek-adm               WPA (1 handshake)
 
Choosing first network as target.
 
Opening sciteekadm.cap
Reading packets, please wait...
 
                                 Aircrack-ng 1.1
 
 
                   [00:00:00] 4 keys tested (300.98 k/s)
 
 
                           KEY FOUND! [ 12345678 ]
Password found! But sadly, wireshark can’t decrypt it, because EAPOL packets are corrupted/missing.
But there is a nice tool called airdecap-ng (thx to @kyprizel):
$ airdecap-ng -p 12345678 sciteekadm.cap -e Sciteek-adm
Total number of packets read           345
Total number of WEP data packets         0
Total number of WPA data packets        55
Number of plaintext data packets         0
Number of decrypted WEP  packets         0
Number of corrupted WEP  packets         0
Number of decrypted WPA  packets        41
$ wireshark sciteekadm-dec.cap
Now we can simply extract a file from tcp session:
The flag: 7e4ef92d1472fa1a2d41b2d3c1d2b77a
Comments
0 Comments
Facebook Comments by Blogger Widgets

0 comments:

Post a Comment

 
Writeup CTF © 2013. All Rights Reserved. Powered by Blogger
Top