Forum Discussion
Modern Encryption: Demonstrate Your Skills (Q9)
Maybe I'm over/under-thinking this (likely) or maybe there's an issue with this lab (less likely) but I'm struggling on Q9. I've successfully encrypted the file in Q5 and have run the appropriate command to retrieve the PSK from the capture file that was created. Per the instructions in the token_3.txt file I'm supposed to use that same password to decrypt an AES-256 file. I cannot get this password to successfully decrypt the file however. I know it's the correct passphrase since I can use it in Wireshark to see the encrypted data in the capture. Am I supposed to extract the key for Q9 from the capture? I'm only seeing mostly DNS traffic (and looked at TXT records to see if a possible token existed in those).
openssl enc -d -aes-256-cbc -nosalt -pbkdf2 -in Desktop/Lab-Files/encrypted_file_AES.enc -out Desktop/Lab-Files/plaintext_AES.txt -pass pass:<PSK from results of aircrack-ng>
I guessing I'm misunderstanding the instructions somehow (even though I feel like they explicitly tell me "you will find that the same password will help you decrypt 'encrypted_file_AES"
Checking my notes (it's been a while, so apologies if anything has changed since I last looked) - the command I used was:
openssl enc -d -aes-256-cbc -in encrypted_file_AES.enc -nosalt -pbkdf2 -k {password_from_aircrack} -a
Not sure about passing it using "-pass pass:"?!?
2 Replies
- autom8on
Silver I
Checking my notes (it's been a while, so apologies if anything has changed since I last looked) - the command I used was:
openssl enc -d -aes-256-cbc -in encrypted_file_AES.enc -nosalt -pbkdf2 -k {password_from_aircrack} -a
Not sure about passing it using "-pass pass:"?!?
- GuyIncognito
Bronze I
Wow, thank you. The -pass pass:"xxx" is the equivilant to the -k xxx command but it was the -a option I was missing. Didn't think about needing to Base64 decode it while decrypting. Thanks again