Réseau
FTP
In this challenge, we have a pcap
file and we are tasked to retrieve bob’s password. We need to find its FTP
password so lets filter by this protocol:
We can see a Login successful
. Lets Left Click > Follow > TCP Stream
to see what happened in this session:
As you can see, we have the password bobman75
for the user bob
.
Telnet
This is the same exercice as for the FTP
but this time for the TELNET
protocol. We can filter this protocol:
Now we can do the same as before : Left Click > Follow > TCP Stream
We can click on the arrows to look at the next streams:
And voilà, we can see in clear text the password bobIscrazy
for the user bob
.
HTTP
Same as before but for the HTTP protocol. We are tasked to find the phpmyadmin root password
. We can use the following filter: http && http.request.full_uri contains phpmyadmin
or http && http.location contains phpmyadmin
Now we can Follow TCP and we can see the username root
and the password FLAG%7BServic3-is-Not-HTTpS%7D
:
We now URL decode: FLAG%7BServic3-is-Not-HTTpS%7D
which gives us the flag: FLAG{Servic3-is-Not-HTTpS}
WPA2
Here, we have a Wifi communication using the protocol 802.11. You can refer to the following blog to get more information about wifi hacking CyberHack
We follow the given steps by first extracting the hash of the pcap
file:
Now we can crack it using hashcat:
And voilà… We found the password iloveyou
for the wifi named X-n0
.
Another method could be to use aicrack-ng. It will only need the pcap
file to crack the password:
FTP 2
Here the flag is not directly in the communication stream but it is located in a file. Because we have sniffed all the trafic, we can export all the files that came through the communication. To do so, you can do the following: File > Export Object > FTP data >
Now you have the list of all the files that went through the communication. You can save it locally:
And voilà… We have the flag in the image: