wifi-basic

Catégorie: Network Difficulté: easy Flag: CTF{73841584e4c011c940e91c76bf1c12a7a4850e4b3df0a27ba8a35388c316d468}

Challenge

Description


Are you the real hacker we are looking for? You have to break one single PSK over the provided interception and also provide the BSSID and ESSID of the broken wifi AP.

from hashlib import sha256

BSSID = ""
ESSID = ""
PSK = ""


def calculate_sha256(bssid, essid, psk):
    input_string = bssid + essid + psk
    hash_result = sha256(input_string.encode()).hexdigest()
    return hash_result
    

sha256_sum = calculate_sha256(BSSID, ESSID, PSK)
print('CTF{'+sha256_sum+'}')

Analyse du pcap

On a devant nous une capture de traffics wifi. En regardant dans Wireless > Trafic WLAN on peut lister les réseaux

Ensuite on peut tester pour tous les réseaux, mais le seul que l’on peut casser est TargetHiddenSSID

$ aircrack-ng -w /usr/share/wordlists/rockyou.txt -b "02:00:00:00:04:00" wifibasic.cap 

                               Aircrack-ng 1.7 

      [00:00:00] 170/10303727 keys tested (6003.35 k/s) 

      Time left: 28 minutes, 36 seconds                          0.00%

                          KEY FOUND! [ tinkerbell ]

      Master Key     : 58 65 AF CE 4E 69 4C 14 DD 09 27 47 EB BD 45 EB 
                       27 9A 75 79 9C D1 4D F5 AF B6 DE 01 4D C2 A8 97 

      Transient Key  : E9 3C E7 CB 66 F4 F6 0A 19 F0 59 5A 29 34 D8 8C 
                       DB 58 72 3D 1F A6 17 00 00 00 00 00 00 00 00 00 
                       00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
                       00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 

      EAPOL HMAC     : C1 D1 C8 EC 42 1E 31 80 61 4C FF 7B 02 8F E4 19 

On trouve le mot de passe tinkerbell


Script de résolution

from hashlib import sha256

BSSID = "02:00:00:00:04:00"
ESSID = "TargetHiddenSSID"
PSK = "tinkerbell"

def calculate_sha256(bssid, essid, psk):
	input_string = bssid + essid + psk
	hash_result = sha256(input_string.encode()).hexdigest()
	return hash_result

sha256_sum = calculate_sha256(BSSID, ESSID, PSK)
print('CTF{' + sha256_sum + '}')
# CTF{73841584e4c011c940e91c76bf1c12a7a4850e4b3df0a27ba8a35388c316d468}

Dernière mise à jour

Cet article vous a-t-il été utile ?