OSPF - Authentification
Challenge link : https://www.root-me.org/fr/Challenges/Reseau/OPSF-Authentification
- 
Download the file 
- 
Extract MD5 with Ettercap 
- 
Copy past the hashes in file cat raw_hashes OSPF-224.0.0.5-0:$netmd5$0201003002020202000000000000000200000a103c7ec8a4fffffffc000a1201000000280c0000020c00000103030303$debe4e93b093ade8a8bc34302c192ced OSPF-224.0.0.5-0:$netmd5$0201003003030303000000000000000200000a103c7ec8a7fffffffc000a1201000000280c0000020c00000102020202$5445df30fe3d20bf23ecf26c2e531387 OSPF-224.0.0.5-0:$netmd5$0201003002020202000000000000000200000a103c7ec8aefffffffc000a1201000000280c0000020c00000103030303$ed964b2ac353eb6b5431d3251a1d2074 OSPF-224.0.0.5-0:$netmd5$0201003003030303000000000000000200000a103c7ec8b0fffffffc000a1201000000280c0000020c00000102020202$91276c153696d2929edaefc7c2131859 OSPF-224.0.0.5-0:$netmd5$0201003002020202000000000000000200000a103c7ec8b7fffffffc000a1201000000280c0000020c00000103030303$c0575e191ba012bd9cd7de3c6bda49c6 OSPF-224.0.0.5-0:$netmd5$0201003003030303000000000000000200000a103c7ec8b9fffffffc000a1201000000280c0000020c00000102020202$0844d60b1f97b377afdf26901c0eee8e OSPF-224.0.0.5-0:$netmd5$0201003002020202000000000000000200000a103c7ec8c1fffffffc000a1201000000280c0000020c00000103030303$e3ff7611705e1e39017d19084efbca1f OSPF-224.0.0.5-0:$netmd5$0201003003030303000000000000000200000a103c7ec8c2fffffffc000a1201000000280c0000020c00000102020202$f1c9059ed03e82547bf45b9755223ac1 OSPF-224.0.0.5-0:$netmd5$0201003002020202000000000000000200000a103c7ec8cafffffffc000a1201000000280c0000020c00000103030303$bde76e1f3eddfe8c7d4f8a32c12300da OSPF-224.0.0.5-0:$netmd5$0201003003030303000000000000000200000a103c7ec8ccfffffffc000a1201000000280c0000020c00000102020202$2c5764c41f15333ad5e6509a0623aeef OSPF-224.0.0.5-0:$netmd5$0201003002020202000000000000000200000a103c7ec8d4fffffffc000a1201000000280c0000020c00000103030303$c0a4b500effed0bd3d537db6c3295a2f OSPF-224.0.0.5-0:$netmd5$0201003003030303000000000000000200000a103c7ec8d5fffffffc000a1201000000280c0000020c00000102020202$59e5abdc9e68404d9cf6bab427d420a4 OSPF-224.0.0.5-0:$netmd5$0201003002020202000000000000000200000a103c7ec8ddfffffffc000a1201000000280c0000020c00000103030303$08cbaa952e00d202a796f8fa76a2982b OSPF-224.0.0.5-0:$netmd5$0201003003030303000000000000000200000a103c7ec8defffffffc000a1201000000280c0000020c00000102020202$ca39bac632801c8857650e8a28a35515
- 
Process the file for only have the Net-MD5 cat raw-hashes.txt | cut -d ":" -f 2 >> net-md5-hashes.txt $netmd5$0201003002020202000000000000000200000a103c7ec8a4fffffffc000a1201000000280c0000020c00000103030303$debe4e93b093ade8a8bc34302c192ced $netmd5$0201003003030303000000000000000200000a103c7ec8a7fffffffc000a1201000000280c0000020c00000102020202$5445df30fe3d20bf23ecf26c2e531387 $netmd5$0201003002020202000000000000000200000a103c7ec8aefffffffc000a1201000000280c0000020c00000103030303$ed964b2ac353eb6b5431d3251a1d2074 $netmd5$0201003003030303000000000000000200000a103c7ec8b0fffffffc000a1201000000280c0000020c00000102020202$91276c153696d2929edaefc7c2131859 $netmd5$0201003002020202000000000000000200000a103c7ec8b7fffffffc000a1201000000280c0000020c00000103030303$c0575e191ba012bd9cd7de3c6bda49c6 $netmd5$0201003003030303000000000000000200000a103c7ec8b9fffffffc000a1201000000280c0000020c00000102020202$0844d60b1f97b377afdf26901c0eee8e $netmd5$0201003002020202000000000000000200000a103c7ec8c1fffffffc000a1201000000280c0000020c00000103030303$e3ff7611705e1e39017d19084efbca1f $netmd5$0201003003030303000000000000000200000a103c7ec8c2fffffffc000a1201000000280c0000020c00000102020202$f1c9059ed03e82547bf45b9755223ac1 $netmd5$0201003002020202000000000000000200000a103c7ec8cafffffffc000a1201000000280c0000020c00000103030303$bde76e1f3eddfe8c7d4f8a32c12300da $netmd5$0201003003030303000000000000000200000a103c7ec8ccfffffffc000a1201000000280c0000020c00000102020202$2c5764c41f15333ad5e6509a0623aeef $netmd5$0201003002020202000000000000000200000a103c7ec8d4fffffffc000a1201000000280c0000020c00000103030303$c0a4b500effed0bd3d537db6c3295a2f $netmd5$0201003003030303000000000000000200000a103c7ec8d5fffffffc000a1201000000280c0000020c00000102020202$59e5abdc9e68404d9cf6bab427d420a4 $netmd5$0201003002020202000000000000000200000a103c7ec8ddfffffffc000a1201000000280c0000020c00000103030303$08cbaa952e00d202a796f8fa76a2982b $netmd5$0201003003030303000000000000000200000a103c7ec8defffffffc000a1201000000280c0000020c00000102020202$ca39bac632801c8857650e8a28a35515
- 
Crack the OSPF key with john john net-md5-hashes.txt --wordlist=/usr/share/wordlists/rockyou.txt Using default input encoding: UTF-8 Loaded 14 password hashes with 14 different salts (net-md5, "Keyed MD5" RIPv2, OSPF, BGP, SNMPv2 [MD5 32/64 or dynamic_39]) Will run 4 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) #10pokemonmaster (?) 14g 0:00:00:13 DONE (2023-08-21 09:37) 1.040g/s 1056Kp/s 14793Kc/s 14793KC/s #18#16torito..!lstpa88! Use the "--show --format=net-md5" options to display all of the cracked passwords reliably Session completed.
- 
Get the flag ! #10pokemonmaster