PicoCTF - WPA-ing Out
tags: PicoCTF CTF Misc
Challenge: WPA-ing Out
Background
Day 26 Wireless Attacks-無線攻擊(aircrack-ng)
Description & Hint
I thought that my password was super-secret, but it turns out that passwords passed over the AIR can be CRACKED, especially if I used the same wireless network password as one in the `rockyou.txt` credential dump. Use this
pcap fileand therockyouwordlist. The flag should be entered in thepicoCTF{XXXXXX}format.
Hint 1: Finding the IEEE 802.11 wireless protocol used in the wireless traffic packet capture is easier with wireshark, the JAWS of the network.
Hint 2: Aircrack-ng can make a pcap file catch big air…and crack a password.
Exploit - aircrack-ng
1 | |
So…The flag is picoCTF{mickeymouse}