router-capture
1 file available
Description
We are developing a new router with military grade security. So, we have captured Wi-Fi and wan traffic from the router. Try to break our encryption.
Solution
Traffic Analysis
The Wi-Fi traffic is encrypted using WEP, but its key cannot be bruteforced in a reasonable time. The wan traffic is primarily composed of TLS packets, but a small percentage of the packets are unencrypted http packets.
Analysis of the http packets
By utilising the display filter http && !tls
in Wireshark, only the unencrypted http packets can be observed, totalling 76 packets.
Therefore, the packets can be manually analysed.
It can be observed that a TR-069 session exists between 10.255.255.35
and 10.24.34.7
.
By analysing the packets, it becomes apparent that the ACS is sending a request to the CPE to change the Wi-Fi password, which is transmitted in plain text.
Utilising the key
With the passkey, the WEP traffic in the Wi-Fi capture can be decrypted. It can be observed that the packets solely consist of SMTP and IMAP packets, suggesting that the flag may be present in one of the emails. By analysing each email, the flag is discovered in one of the attachments of an email from Bob to Alice.