24 Apr 2021
Challenge Description:
Description:
nc challs.m0lecon.it 11000
Foreword
CryptoGolf was the first challenge of a series of very fun and interesting cryptography challenges that my teammates and I solved in m0leconCTF World Quals where we placed 5th globally in the Open Division, qualifying for the Grand Finals in Turin, Italy.
Continue Reading »
17 July 2020
This was a writeup for a crypto challenge in RACTF 2020, where we placed 6th.
Challenge Description:
Challenge instance ready at 95.216.233.106:57735
We found a strange service, it looks like you can generate an access token for the network service, but you shouldn't be able to read the flag... We think.
Solving :
We are given access.py. Lets take a look the server file to see what the program does.
From the top, we see that get_flag
:
Continue Reading »
16 July 2020
Challenge Description:
Man, oracles are weird.
nc challenges1.hexionteam.com 5000
Solving :
Really Smart Acronym, of course, is RSA. Looking at the code, it uses PyCrypto to generate a RSA key to encrypt the flag. You also get one encryption and 1024 decrypts, but you only get the last bit of the decrypts. At first I thought it could be Franklin-Reiter related-message attack, but there is not enough information for that.
Continue Reading »
15 July 2020
This is a writeup for HexionCTF 2020, where RGBsec placed third.
Challenge Description:
Math is so beautiful and can always be used for cryptographic
encryption!
nc challenges1.hexionteam.com 5001
Solving :
We are given an sss.py. See here for source.
We found that SSS stands for Shamir’s Secret Sharing by copy-pasting the loop from eval_at
, which brought me to this Wikipedia page. Shamir Secret Sharing is based on polynomials and lagrange interpolation.
Continue Reading »