PicoCTF - WPA-ing Out
29 Sep 2022picoCTF
Challenge
Tags
PicoGym Exclusive / Forensics
Description
I thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the rockyou.txt credential dump.
Use this ‘pcap file’ and the rockyou wordlist. The flag should be entered in the picoCTF{XXXXXX} format.
Prereguisite
Aircrack-Ng, which is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.
Writeup
- Download the pcap file and rockyou wordlist.
- Crack
aircrack-ng -w rockyou.txt wpa-ing_out.pcap