SSID 2: Difference between revisions
From Pessin randon wiki
images |
No edit summary |
||
| Line 22: | Line 22: | ||
===Flag=== | ===Flag=== | ||
<code>aee7d6e6-4e05-4fa6- | <code>aee7d6e6-4e05-4fa6-b0cb-a53439b55224</code> | ||
===Links=== | ===Links=== | ||
*[[CTF Challenges | Back to CTF Challenges page]] | *[[CTF Challenges | Back to CTF Challenges page]] | ||
Latest revision as of 15:39, 9 September 2022
Description
After cracking the wifi password in previous challenge, you can now start investigating the traffic in the pcap.
100pts
Question
Analyse the pcap and find the flag.
Solution
Insert wlan password as a WPA-PWD pinkpanther. You will find it at wireshark -> Edit -> Preferences -> Protocols -> IEEE 802.11 -> Decryption keys -> Edit
Then I just start to browse through packets and start with tcp streams. Using "Follow TCP stream" I just did go through streams one by one until I found something interestin. In stream 6 was http answer where was flag base64 encoded. So I decoded that and found that you have to encode it again. Until that I got the flag.
Tools
- wireshark
- echo
- base64
Flag
aee7d6e6-4e05-4fa6-b0cb-a53439b55224