Skip to content

Latest commit

 

History

History
26 lines (16 loc) · 925 Bytes

WPA-ing_Out.md

File metadata and controls

26 lines (16 loc) · 925 Bytes

Description

I thought that my password was super-secret, but it turns out
that passwords passed over the AIR can be CRACKED,
especially if I used the same wireless network password as
one in the rockyou.txt credential dump.
Use this 'pcap file' and the rockyou wordlist. The flag should
be entered in the picoCTF{XXXXXX} format.

Solution

I looked at this hint:

"Aircrack-ng can make a pcap file catch big air...and crack a password."

Along with the description mentioning rockyou.txt made this challenge quite straightforward.

wget https://artifacts.picoctf.net/c/41/wpa-ing_out.pcap

Then I just ran aircrack-ng with the rockyou word list and the pcap.

aircrack-ng -w /usr/share/wordlists/rockyou.txt wpa-ing_out.pcap

This gave the key/password. I then put it in the picoCTF{} format as described in the description and it was the correct flag.

Flag: picoCTF{mick...}