Skip to main content

WPA-ing Out

  • Description: I thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the rockyou.txt credential dump.
  • Difficulty: Medium

🔎 Solution

After opening the pcap file in Wireshark, it's clear that the captured data comes from an IEEE 802.11 wireless network with the SSID Gone_Surfing. The capture contains various packets, including EAPOL packets, which are used in the WPA/WPA2 authentication process.

Using aircrack-ng, I analyzed the capture to determine whether the traffic was encrypted. The result showed that the network with SSID "Gone_Surfing" used WPA encryption and contained one handshake.

┌──(kali㉿kali)-[~/Desktop]
└─$ aircrack-ng wpa-ing_out.pcap
Reading packets, please wait...
Opening wpa-ing_out.pcap
Resetting EAPOL Handshake decoder state.
Resetting EAPOL Handshake decoder state.
Read 23523 packets.

# BSSID ESSID Encryption

1 00:5F:67:4F:6A:1A Gone_Surfing WPA (1 handshake)

Choosing first network as target.

Reading packets, please wait...
Opening wpa-ing_out.pcap
Resetting EAPOL Handshake decoder state.
Resetting EAPOL Handshake decoder state.
Read 23523 packets.

1 potential targets

To attempt password cracking, I ran the command:

aircrack-ng wpa-ing_out.pcap -w /usr/share/wordlists/rockyou.txt

Using the RockYou wordlist, the correct password was successfully recovered: mickeymouse. The flag for this challenge is the password itself: mickeymouse.

🚩Flag

picoCTF{mickeymouse}