Decrypt

Prompt

The S in HTTPS stands for secure and it uses the TLS/SSL protocol to achieve its security. Let's decrypt this traffic to find the hidden flag.

SSL Decrypt.pcapng6.4KB
sslkeylog.log0.4KB

Tutorial Video

Walk-Through

This challenge involves using a provided SSL key log file to decrypt HTTPS traffic. You can also follow one of these other guides which also provide instructions on how to perform this task:

https://unit42.paloaltonetworks.com/wireshark-tutorial-decrypting-https-traffic/

https://my.f5.com/manage/s/article/K19310681

To decrypt the HTTPS traffic, open the packet capture in Wireshark and then load in the SSL key log with the following steps:

  1. Open preferences (Edit → Preferences)
  2. image
  3. Expand Protocols and select TLS (or SSL in older versions of Wireshark)
  4. image
  5. Select the SSL key log file for the (Pre)-Master-Secret log filename
  6. image

After following these steps, Wireshark will now be able to decrypt the HTTPS traffic. You can then view the plaintext data by right-clicking a HTTP/HTTPS packet and selecting Follow → TLS Stream

image

Questions

What Cipher Suite was chosen by the secure socket server?

Select packet #6 (the TLS Server Hello) and look for the “Cipher Suite”. This can be found in the packet dissection under Transport Layer Security → TLSv1.2 Record Layer: Handshake Protocol: Server Hello → Handshake Protocol: Server Hello → Cipher Suite

What is the domain covered by the SSL key?

Select packet #6 (the TLS Server Hello) and look for the “common name” of the SSL certificate. This can be found in the packet dissection under Transport Layer Security → TLSv1.2 Record Layer: Handshake Protocol: Certificate → Handshake Protocol: Certificate → Certificates → Certificate.

What is the flag transferred over HTTPS?

Follow the TLS stream for packet #10 (the request for /flag.txt)

©️ 2024 Cyber Skyline. All Rights Reserved. Unauthorized reproduction or distribution of this copyrighted work is illegal.