Level02
Password captured in Network Packet (PCAP)
Last updated
Was this helpful?
Password captured in Network Packet (PCAP)
Last updated
Was this helpful?
Once we log into level02 account we find a p file named level02.pcap.
In the ISO provided for Snow Crash there aren't any appropriate tools to open and analyse the level02.pcap file so to be able to analyse the file we transfar the file to our local computer (or any computer where we can analyse it). To transfar the file we use the scp command as follows:
Once we have obtain the file we can open it in wireshark so we can se what's happening.
Once we open the file in wireshark after some looking arround we can see a packet containing the word Password as you can see in the following image :
To know more what's going on with this packet we can follow the TCP stream of this packet as shown in the image bellow :
Once the new window show up with the whole TCP stream we see the following :
So the password is revealed here as ft_wandr...NDRel.L0L
but the "." (dots) are representation of non printable data so if we change the data representation from ASCII to C Arrays we can see the ascii
code as follows :
So in this form we can better see what happened. We can see that the user first wrote f
t
_
w
a
n
d
r
and then pressed Delete
3 times thus erased the last three character so we have only ft_wa
and the user types N
D
R
e
l
and once again the user Delet
s the last character (l
) and then types L
0
L
. So by this we now the password is ft_waNDReL0L.
So now we know the password to log into flag02 account and to do this we do the following command :
and once we are logged in we get the password for the level03 account using the usual command :
The Password to connect to the account level03 is kooda2puivaav1idi4f57q8iq