Skip to the content.

Pulling Passwords from Thin Air

Description

I seem to have lost my password, and can’t seem to find where I wrote it down. But I’ve got a device using it for another purpose on my network, so maybe it is somewhere in this packet capture I took at my house?

Other information

Value: 50 points

Included files: air-raid.cap

Solution

Opening up this network capture in a tool like Wireshark there is a lot of information, combinations of MDNS, 802.11, TCP, SSH, and HTTP. My immediate goto would be the HTTP traffic, as it is unencrypted, and something that I can view easily. And there a few HTTP packets, with one of them getting a 200 response from the server.

HTTP Request

Taking a look at the request this is a GET request to / with quite a few headers. One of which being Authorization, and has the value of Basic YWRtaW46c3AwMGt5e3NjcmVhbWluZ19pbnRvX3RoZV92b2lkfQ==. Taking a look at what Basic HTTP authorization is, this is a base64 encoded string of <username>:<password>. So decoding this gives us the username admin and the password sp00ky{screaming_into_the_void} which is your flag.

Extra

I also really like how Wireshark will automatically decode this authorization header for you, instead of having to use a different tool.

Decoded Header