Introduction
Analyze the pcap file using Wireshark
Open the pcap file using Wireshark to analyze the traffic.
- Launch Wireshark and open the level02.pcap file.
- Look for any interesting packets or data that might contain sensitive information such as login attempts, credentials, etc.
- In this case, the output contains encoded or obscured information including login attempts and a potentially useful password.
Decode the password
From the analysis, you will see the following sequence in the packet data:
1 | ..%..%..&..... ..#..'..$..&..... ..#..'..$.. .....#.....'........... .38400,38400....#.SodaCan:0....' |
The password ft_wandr...NDRel.L0L
seems obscured with 0x7f
hex characters (DEL ASCII) in the packet data.
Hexadecimal analysis and password correction
Given the hexadecimal dump
1 | 000000B9 66 f |
The 7f
hex character is the DEL ASCII character. Removing the 7f characters and adjusting the string, we get the correct password:
- Original: ft_wandr...NDRel.L0L
- Remove ndr
and replace with NDR
- Corrected Password: ft_waNDReL0L
Now you can connect with flag02
with this password ft_waNDReL0L