WPA
Learning about aircrack.
File
The pcap consists of 888 packets using protocol 802.11, noticing Key, Acknowledgement and Authentication packets (and given the title of this challenge), we decide to run it through aircrack.
Attack
aircrack needs to be given a word list and rockyou.txt is a great candidate. Indeed, rockyou.txt is a popular compilation of leaked passwords.
$ aircrack-ng -w rockyou.txt savedcap.cap
Opening savedcap.capase wait...
Read 888 packets.
# BSSID ESSID Encryption
1 52:E2:4D:0A:A6:36 Pctf wifi challenge WPA (1 handshake)
Choosing first network as target.
Opening savedcap.capase wait...
Read 888 packets.
1 potential targets
Aircrack-ng 1.5.2
[00:00:00] 6120/7120714 keys tested (9665.44 k/s)
Time left: 12 minutes, 16 seconds 0.09%
KEY FOUND! [ qazwsxedc ]
Master Key : 80 BE 3E 9E C4 BC 60 8C ED E6 40 BD DF 70 FE E1
9F 3D BA 29 A1 C9 E4 C3 EC C2 A3 8B 84 1A AC 2B
Transient Key : E7 E7 14 2D 60 C9 EE 49 BC C1 04 19 48 30 4B 4C
40 B9 66 D4 BC 1E BD 12 CD 77 0E 20 7B 78 35 28
7F 54 8B 44 3A E3 72 EB 5E 46 AC CE 2B 28 1F C8
1E F1 53 B0 3F C4 A1 D4 32 AB 38 83 9A E7 9B 03
EAPOL HMAC : 4B 42 21 CA DD 22 82 EE 83 2A AA 6E 1B 05 29 5E
Flag
PCTF{qazwsxedc}