picoCTF 2022: Crypto – substitution challenges

Ulli Weichert/ April 4, 2022/ IT-Security, Write-Ups/ 0Kommentare

Substitution Challenges Because this challenges are all very similar, we will not describe them in own articles 🙂 . Solving Substitutions cypher replace the 26 letters of an alphabet with other letters (one letter matches only one other). If you can find out which letter was replaced with which letter, then you can crack this cypher relatively easily. The best

Weiterlesen

picoCTF 2022: Crypto – rail-fence

Ulli Weichert/ April 3, 2022/ IT-Security, Write-Ups/ 0Kommentare

rail-fence Description A type of transposition cipher is the rail fence cipher, which is described here. Here is one such cipher encrypted using the rail fence with 4 rails. Can you decrypt it? Download the message here. Put the decoded message in the picoCTF flag format, picoCTF{decoded_message}. Solving So – there is everything we need to know in the challenge

Weiterlesen

picoCTF 2022: Crypto – Diffie Hellman

Ulli Weichert/ April 3, 2022/ IT-Security, Write-Ups/ 0Kommentare

diffie-hellman Description Alice and Bob wanted to exchange information secretly. The two of them agreed to use the Diffie-Hellman key exchange algorithm, using p = 13 and g = 5. They both chose numbers secretly where Alice chose 7 and Bob chose 3. Then, Alice sent Bob some encoded text (with both letters and digits) using the generated key as

Weiterlesen

picoCTF 2022: Crypto – credstuff

Ulli Weichert/ April 3, 2022/ IT-Security, Write-Ups/ 0Kommentare

credstuff Description We found a leak of a blackmarket website’s login credentials. Can you find the password of the user cultiris and successfully decrypt it? Download the leak here. The first user in usernames.txt corresponds to the first password in passwords.txt. The second user corresponds to the second password, and so on. Solving We got a tar file – extract

Weiterlesen

picoCTF 2022: Crypto – basic_mod2

Ulli Weichert/ April 2, 2022/ IT-Security, Write-Ups/ 0Kommentare

basic-mod2 Description A new modular challenge! Download the message here. Take each number mod 41 and find the modular inverse for the result. Then map to the following character set: 1-26 are the alphabet, 27-36 are the decimal digits, and 37 is an underscore. Wrap your decrypted message in the picoCTF flag format (i.e. picoCTF{decrypted_message}) Solving This challenge is similar

Weiterlesen

picoCTF 2022: Crypto – basic_mod1

Ulli Weichert/ März 30, 2022/ IT-Security, Write-Ups/ 0Kommentare

basic-mod1 Description We found this weird message being passed around on the servers, we think we have a working decrpytion scheme. Download the message here. Take each number mod 37 and map it to the following character set: 0-25 is the alphabet (uppercase), 26-35 are the decimal digits, and 36 is an underscore. Wrap your decrypted message in the picoCTF

Weiterlesen

DamCTF 2021: misc – bad-patterns / Writeup

Christian Leipold/ November 11, 2021/ IT-Security, Write-Ups/ 0Kommentare

DamCTF 2021 misc/bad-patterns BaboonWithTheGoon A hacker was too lazy to do proper encryption. However, they left us some examples of how their encryption "algo" was supposed to work. original text : "Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris

Weiterlesen

DEADFACE CTF 2021: Cryptography2 – Poor MEGAN! / Writeup

Ulli Weichert/ Oktober 18, 2021/ IT-Security, Write-Ups/ 0Kommentare

Poor MEGAN! Points 20 Description Oh, NO! Poor Megan! She’s just been bitten by a ZOMBIE! We can save her if we act fast, but the formula for the antidote has been scrambled somehow. Figure out how to unscramble the formula to save Megan from certain zombification. Enter the answer as flag{here-is-the-answer}. The formula for the antidote: j2rXjx9dkhW9eLKsnMR9cLDVjh/9dwz1QfGXm+b9=wKslL1Zpb45 Getting the

Weiterlesen