SSID 2: Difference between revisions

From Pessin randon wiki
Line 8: Line 8:


===Solution===
===Solution===
Insert wlan password as a WPA-PWD <code>pinkpanther</code>. You will find it at wireshark -> Edit -> Preferences -> Protocols -> IEEE 802.11 -> Decryption keys -> Edit
Then I just start to browse through packets and start with tcp streams. Using "Follow TCP stream" I just did go through streams one by one until I found something interestin. In stream 6 was http answer where was flag base64 encoded. So I decoded that and found that you have to encode it again. Until that I got the flag.


===Tools===
===Tools===
* wireshark
* echo
* base64


===Flag===
===Flag===
 
<code>aee7d6e6-4e05-4fa6-b0cd-a53439b55224</code>
===Links===
===Links===
*[[CTF Challenges | Back to CTF Challenges page]]
*[[CTF Challenges | Back to CTF Challenges page]]

Revision as of 13:45, 7 September 2022

Description

After cracking the wifi password in previous challenge, you can now start investigating the traffic in the pcap.

100pts

Question

Analyse the pcap and find the flag.

Solution

Insert wlan password as a WPA-PWD pinkpanther. You will find it at wireshark -> Edit -> Preferences -> Protocols -> IEEE 802.11 -> Decryption keys -> Edit

Then I just start to browse through packets and start with tcp streams. Using "Follow TCP stream" I just did go through streams one by one until I found something interestin. In stream 6 was http answer where was flag base64 encoded. So I decoded that and found that you have to encode it again. Until that I got the flag.

Tools

  • wireshark
  • echo
  • base64

Flag

aee7d6e6-4e05-4fa6-b0cd-a53439b55224