keyboard_arrow_up

title: Writeup DaVinciCTF 2025 - Victory of Samothrace
date: May 25, 2025
tags: Writeups Hardware WiFi DaVinciCTF2025


DaVinciCTF - 🗿 Victory of Samothrace

Difficulty: Very Easy
Category: Hardware
Description: Suspicious behavior has been detected around the Winged Victory of Samothrace, the Hellenistic masterpiece representing the goddess Nike. A new wireless security system has been installed to monitor this priceless sculpture dating back to the 2nd century BC.

Our teams have noticed unusual Wi-Fi transmissions coming from the security device. We suspect a configuration issue by the administrator: information about the device might be circulating in plain text on the network.

Your mission: capture and analyze the network traffic emitted by the access point "C_LOUVRE_Security_System_6.8.7" in order to intercept the administrator credentials.

The preservation of our national treasures depends on your expertise in packet sniffing. The Wi-Fi password is L0uvr3_W1F1.

For this challenge, each team received:

📡 Step 1: Network Reconnaissance

The first step is to connect to the wireless network mentioned in the challenge description.

SSID: C_LOUVRE_Security_System_6.8.7
Password: L0uvr3_W1F1

After successfully connecting to the network, we need to capture and analyze the network traffic to identify any suspicious communications. For this purpose, we'll use Wireshark.

🔍 Step 2: Packet Analysis

With Wireshark running, we begin analyzing the network traffic. After a brief observation, we notice unusual UDP broadcast traffic on port 1900:

wireshark udp filter

Port 1900, here is being used to broadcast what appears to be telemetry data. This is highly unusual on a WiFi network.

Upon examining the packet contents, we discover something interesting. The system is broadcasting telemetry data in plaintext JSON format:

wireshark user password

The JSON payload contains three critical pieces of information: webui address, username and password.

🔐 Step 3: Web Interface Access

With the discovered credentials and web UI address, we can now attempt to access the security system's administrative interface:

URL: http://192.168.4.1
Username: curator
Password: VictoireDeSamothrace1863

Navigating to the URL, we're presented with the login interface for the Samothrace's security system:

web admin panel

Using the credentials we intercepted from the network traffic, we successfully authenticate and gain access to the administrative panel.

The interface reveals a message containing our flag:

web flag

🚩 DVCTF{V1ct0ry_W1ng3d_N1k3_Sn1ff3d_Tr4ff1c}