f100 – SSL Sniff 2

Home / Wiki / f100 – SSL Sniff 2

f100 – SSL Sniff 2

Revision for “f100 – SSL Sniff 2” created on 9 de dezembro de 2015 às 20:43:00

Título
f100 - SSL Sniff 2
Conteúdo
<blockquote> <p id="pergunta" style="text-align: justify">We received a network capture file of an HTTPS request that was MITMd. This time we know that the actual request had useful information, and thanks to you we now have the culprit's private key. Find the useful information</p> </blockquote> <a href="https://ctf-br.org/wp-content/uploads/2015/12/SSLSniff2.7z" rel="">SSLSniff2</a> <h2>Solução</h2> O desafio fornece o pcap para análise e a private key, primeiro passo abrir o pcap com Wireshark e depois importa a key. <a href="https://ctf-br.org/wp-content/uploads/2015/12/01-1.png" rel="attachment wp-att-1781"><img class="alignnone size-large wp-image-1781" src="https://ctf-br.org/wp-content/uploads/2015/12/01-1-1024x640.png" alt="01" width="1024" height="640" /></a> Após analisar o tráfego e perceber um acesso a uma página com nome key.html achamos a flag. <a href="https://ctf-br.org/wp-content/uploads/2015/12/02.png" rel="attachment wp-att-1782"><img class="alignnone size-large wp-image-1782" src="https://ctf-br.org/wp-content/uploads/2015/12/02-1024x640.png" alt="02" width="1024" height="640" /></a> <h3>Flag</h3> <code>39u7v25n1jxkl123</code> <h3>Criado por</h3> RTFM
Resumo


OldNewDate CreatedAuthorActions
9 de dezembro de 2015 às 20:43:00 RTFM
Recent Posts