Tags: forensics
Rating: 3.7
### Challenge Work
First we open the thing up in Wireshark. We notice a total of three devices. Here we will nickname them: `Zte`, `Gemtek`, `Azurewav`. Looking at the first packet it is a beacon packet from `Zte`. So `Zte` is a router of some kind. `Gemtek` then authenticates to `Zte`. `Gemtek` then starts a conversation with `Azurewav`.
Looking at the conversation between `Gemtek` and `Azurewav` we can determine that `Zte` is just a wireless device betwixt them:
```
BSS Id: Zte_c0:59:b3 (c0:fd:84:c0:59:b3)
```
Looking at the EAPOL packets we realize this is WPA with a password. Let us use `aircrack-ng`:
```
galleywest:ppc/ $ aircrack-ng -z -w /usr/share/wordlists/rockyou.txt ATLAS_Capture.pcap
[00:00:06] 25625/14344392 keys tested (4290.17 k/s)
Time left: 55 minutes, 37 seconds 0.18%
KEY FOUND! [ nighthawk ]
Master Key : 2B C3 90 3F 5A 04 8E BF 0B 35 06 13 B3 73 E5 32
11 C0 A7 F4 99 F3 42 DF D6 8E E0 B7 9E 90 F2 83
Transient Key : 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL HMAC : FA E2 20 1F 32 93 6D AB E8 B4 68 63 0B E6 E3 C6
```
The password is `nighthawk`. Looking in the beacon frame we can see the SSID is `ATLAS_PMC`. If we go to Wireshark > Preference > Protocols > IEEE 802.11 we can add decryption keys. Add a `wpa-` type of key (note nothing following the `-`) of value `nighthawk:ATLAS_PMC`.
When we do this we notice a PDF being downloaded. We Right Click > Copy as Hex stream and do the following:
```
galleywest:ppc/ $ vim pdf.hex
galleywest:ppc/ $ cat pdf.hex | xxd -r -p > pdf.pdf
```
Opening the PDF and scrolling to the bottom reveals our flag: `ractf{j4ck_ry4n}`