wifiland
This challenge was presented at UNbreakable Romania 2024.
Last updated
This challenge was presented at UNbreakable Romania 2024.
Last updated
First, open the pcap file using Wireshark and check out the packets. Looks like we're dealing with Wi-Fi traffic here. I filtered the packets by EAPOL protocol and found a handshake being established. There are two ways to find the password: you can grab the hashed password and crack it, or you can use the aircrack-ng tool. I went with aircrack-ng
because it's simpler for me.
Now decrypt the Wi-Fi traffic using the password found above, following these steps:
Go to Edit -> Preferences -> Protocols -> IEEE 802.11
In this window, select "Enable decryption"
Go to Decryption Keys->Edit
To add the Decryption key, select "New"
In the "Key Type" select one among the security types listed "WEP/WPA-PWD/WPA-PSK", according to the AP(Router)'s security configuration.
In the "Key" tab provide the appropriate password.
Now filter packets for ARP protocol and you'll see two IPv4 addresses.
Run this code and you will get the flag.