wifi-basic
Catégorie: Network Difficulté: easy Flag: CTF{73841584e4c011c940e91c76bf1c12a7a4850e4b3df0a27ba8a35388c316d468}
Challenge
Description
Are you the real hacker we are looking for? You have to break one single PSK over the provided interception and also provide the BSSID and ESSID of the broken wifi AP.
from hashlib import sha256
BSSID = ""
ESSID = ""
PSK = ""
def calculate_sha256(bssid, essid, psk):
input_string = bssid + essid + psk
hash_result = sha256(input_string.encode()).hexdigest()
return hash_result
sha256_sum = calculate_sha256(BSSID, ESSID, PSK)
print('CTF{'+sha256_sum+'}')
Analyse du pcap
On a devant nous une capture de traffics wifi. En regardant dans Wireless > Trafic WLAN
on peut lister les réseaux

Ensuite on peut tester pour tous les réseaux, mais le seul que l’on peut casser est TargetHiddenSSID
$ aircrack-ng -w /usr/share/wordlists/rockyou.txt -b "02:00:00:00:04:00" wifibasic.cap
Aircrack-ng 1.7
[00:00:00] 170/10303727 keys tested (6003.35 k/s)
Time left: 28 minutes, 36 seconds 0.00%
KEY FOUND! [ tinkerbell ]
Master Key : 58 65 AF CE 4E 69 4C 14 DD 09 27 47 EB BD 45 EB
27 9A 75 79 9C D1 4D F5 AF B6 DE 01 4D C2 A8 97
Transient Key : E9 3C E7 CB 66 F4 F6 0A 19 F0 59 5A 29 34 D8 8C
DB 58 72 3D 1F A6 17 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL HMAC : C1 D1 C8 EC 42 1E 31 80 61 4C FF 7B 02 8F E4 19
On trouve le mot de passe tinkerbell
Script de résolution
from hashlib import sha256
BSSID = "02:00:00:00:04:00"
ESSID = "TargetHiddenSSID"
PSK = "tinkerbell"
def calculate_sha256(bssid, essid, psk):
input_string = bssid + essid + psk
hash_result = sha256(input_string.encode()).hexdigest()
return hash_result
sha256_sum = calculate_sha256(BSSID, ESSID, PSK)
print('CTF{' + sha256_sum + '}')
# CTF{73841584e4c011c940e91c76bf1c12a7a4850e4b3df0a27ba8a35388c316d468}
Dernière mise à jour
Cet article vous a-t-il été utile ?