Tags: forensics
Rating: 3.7
First we open the thing up in Wireshark. We notice a total of three devices. Here we will nickname them: Zte
, Gemtek
, Azurewav
. Looking at the first packet it is a beacon packet from Zte
. So Zte
is a router of some kind. Gemtek
then authenticates to Zte
. Gemtek
then starts a conversation with Azurewav
.
Looking at the conversation between Gemtek
and Azurewav
we can determine that Zte
is just a wireless device betwixt them:
BSS Id: Zte_c0:59:b3 (c0:fd:84:c0:59:b3)
Looking at the EAPOL packets we realize this is WPA with a password. Let us use aircrack-ng
:
galleywest:ppc/ $ aircrack-ng -z -w /usr/share/wordlists/rockyou.txt ATLAS_Capture.pcap
[00:00:06] 25625/14344392 keys tested (4290.17 k/s)
Time left: 55 minutes, 37 seconds 0.18%
KEY FOUND! [ nighthawk ]
Master Key : 2B C3 90 3F 5A 04 8E BF 0B 35 06 13 B3 73 E5 32
11 C0 A7 F4 99 F3 42 DF D6 8E E0 B7 9E 90 F2 83
Transient Key : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL HMAC : FA E2 20 1F 32 93 6D AB E8 B4 68 63 0B E6 E3 C6
The password is nighthawk
. Looking in the beacon frame we can see the SSID is ATLAS_PMC
. If we go to Wireshark > Preference > Protocols > IEEE 802.11 we can add decryption keys. Add a wpa-
type of key (note nothing following the -
) of value nighthawk:ATLAS_PMC
.
When we do this we notice a PDF being downloaded. We Right Click > Copy as Hex stream and do the following:
galleywest:ppc/ $ vim pdf.hex
galleywest:ppc/ $ cat pdf.hex | xxd -r -p > pdf.pdf
Opening the PDF and scrolling to the bottom reveals our flag: ractf{j4ck_ry4n}