Description
Are you the real hacker we are looking for? You have to break one single PSK over the provided interception and also provide the BSSID and ESSID of the broken wifi AP.
Copier from hashlib import sha256
BSSID = ""
ESSID = ""
PSK = ""
def calculate_sha256(bssid, essid, psk):
input_string = bssid + essid + psk
hash_result = sha256(input_string.encode()).hexdigest()
return hash_result
sha256_sum = calculate_sha256(BSSID, ESSID, PSK)
print('CTF{'+sha256_sum+'}')
On a devant nous une capture de traffics wifi. En regardant dans Wireless > Trafic WLAN
on peut lister les réseaux
Ensuite on peut tester pour tous les réseaux, mais le seul que l’on peut casser est TargetHiddenSSID
Copier $ aircrack-ng -w /usr/share/wordlists/rockyou.txt -b "02:00:00:00:04:00" wifibasic.cap
Aircrack-ng 1.7
[00:00:00] 170/10303727 keys tested (6003.35 k/s)
Time left: 28 minutes, 36 seconds 0.00%
KEY FOUND! [ tinkerbell ]
Master Key : 58 65 AF CE 4E 69 4C 14 DD 09 27 47 EB BD 45 EB
27 9A 75 79 9C D1 4D F5 AF B6 DE 01 4D C2 A8 97
Transient Key : E9 3C E7 CB 66 F4 F6 0A 19 F0 59 5A 29 34 D8 8C
DB 58 72 3D 1F A6 17 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL HMAC : C1 D1 C8 EC 42 1E 31 80 61 4C FF 7B 02 8F E4 19
Copier from hashlib import sha256
BSSID = "02:00:00:00:04:00"
ESSID = "TargetHiddenSSID"
PSK = "tinkerbell"
def calculate_sha256(bssid, essid, psk):
input_string = bssid + essid + psk
hash_result = sha256(input_string.encode()).hexdigest()
return hash_result
sha256_sum = calculate_sha256(BSSID, ESSID, PSK)
print('CTF{' + sha256_sum + '}')
# CTF{73841584e4c011c940e91c76bf1c12a7a4850e4b3df0a27ba8a35388c316d468}