M 105: Plaintext Login (15 pts) M 105:明文登录(15分)

What You Need for This Project你需要什么这个项目

Purpose目的

To observe network transmissions from an insecure app, and prove that they are not encrypted properly.观察来自不安全应用程序的网络传输,并证明它们未正确加密。

Background背景

This problem is gaining recognition, so few apps still have this flaw.这个问题越来越受到认可,因此很少有应用程序仍然存在这个缺陷。 Clear Messenger, which was used used in an earlier version of this project , but that app has been removed from Google Play , as of Feb 10., 2019. Clear Messenger,用于此项目的早期版本 ,但该应用程序已从Google Play中删除 ,截至2019年2月10日。

So please use one of these apps instead.因此,请使用其中一个应用程序。 They all used plaintext network transmission on Feb 10, 2019, but eventually they may be fixed or removed.它们都在2019年2月10日使用了明文网络传输,但最终它们可能被修复或删除。

Installing a Vulnerable App安装易受攻击的应用程序

On your Android device, in Google Play, find and install the app shown below.在您的Android设备上,在Google Play中,查找并安装如下所示的应用。

Equity Pandit权益Pandit

Archived APK存档APK

If you don't have access to Google Play, use this archived copy of the app:如果您无法访问Google Play,请使用此应用的存档副本:

base-eqp.apk 基eqp.apk

Starting Wireshark启动Wireshark

On your host system, launch Wireshark.在主机系统上,启动Wireshark。 If you don't have it, get it at:如果您没有,请访问:

https://www.wireshark.org/ https://www.wireshark.org/

In the main Wireshark window, double-click the network interface that is being used to reach the Internet.在Wireshark主窗口中,双击用于访问Internet的网络接口。 On my system, it is " Wi-Fi: en0 ", outlined in green in the image below.在我的系统上,它是“ Wi-Fi:en0 ”,在下图中以绿色标出

Wirehark starts displaying packets. Wirehark开始显示数据包。 At the top, in the Filter bar, enter this display filter:在顶部,在过滤器栏中,输入以下显示过滤器:

http HTTP
Press Enter to filter the traffic.Enter键过滤流量。

On your Android device, in the vulnerable app, use the "Create Account" page to make an account.在您的Android设备上,在易受攻击的应用中,使用“创建帐户”页面来创建帐户。

Wireshark shows a captured POST request, as shown below. Wireshark显示捕获的POST请求,如下所示。

Troubleshooting故障排除

If you don't see any packets, try these fixes:如果您没有看到任何数据包,请尝试以下修复:
  • Click the red square button to stop the capture单击红色方块按钮以停止捕获
  • From the menu, click Capture , Options从菜单中,单击“ 捕获” ,“ 选项”
  • Choose a different network adapter选择其他网络适配器
  • If the "Link-layer header" is set to "802.11...", scroll to the right and uncheck the monitor box如果“链路层标头”设置为“802.11 ...”,请向右滚动并取消选中监视器
In the top pane of Wireshark, right-click the POST request, and click Follow , " TCP Stream ", as shown above.在Wireshark的顶部窗格中,右键单击POST请求,然后单击Follow ,“ TCP Stream ”,如上所示。

The request appears, containing your credentials, as shown below.将显示包含您的凭据的请求,如下所示。


M 105: Filename (15 pts) M 105:文件名(15分)

Find the text covered by a green box in the image above.找到上图中绿框所覆盖的文字。 That's the flag.那是旗帜。
Converted to a CTF 2-28-19转换为CTF 2-28-19