PicoCTF - WPA-ing Out



PicoGym Exclusive / Forensics


I thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the rockyou.txt credential dump.
Use this ‘pcap file’ and the rockyou wordlist. The flag should be entered in the picoCTF{XXXXXX} format.


Aircrack-Ng, which is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.


  1. Download the pcap file and rockyou wordlist.
  2. Crack
     aircrack-ng -w rockyou.txt wpa-ing_out.pcap