It’s Complicated My Pal
Jun 19, 2021
- After analyzing several packets we can conclude that there is something to be done with
ICMP
. - So apply the
ICMP filter
and startanalyzing
. - We can see that packets from the
source = 192.168.1.200
has someZIP
Magic Numbers. - In
scapy
there are lots of ways to extract the data. - We can see that the hex values of the
ZIP
start from thehex
positionx002A
in allICMP
packets. - The
Bytes
Equivalent ofHex = x002A
is42 Bytes
. - So
slice
the rest of thechunks
. - It can be indentified by seeing the
hex
of theZIP
.
- After
compiling
andrunning
thescript
we shall get theZIP
file. - But it's Password Protected.
- So using Frackzip we shall crack the Password.
Password --> craccer