Maojui

AIS3 2019 - MaoHash (Crypto, 436)

Length extension attack
Challenge檔案 : task.py 與這個 server 溝通有規定的格式:mac&&sess&&cmd mac : username, password, sessionID, cmd 的 maohash 值sess: 該次連線會給你一個 sessi ...
Read more

AIS3 2019 - RSA101 (Crypto, 290)

RSA Binary search
Challenge連線過去會拿到 RSA pubkey (N,e),與一個 Phi oracle 你可以輸入任意數字,他會回傳 ((你傳的數字 n) % phi ) % 64 Solution如果輸入比 $phi$ 大的一個 2 的 $n$ 次方,會回傳一個 $(2^{n}\ mod\ ...
Read more

AIS3 2019 - RSA202 (Crypto, 209)

RSA Fermat's factorization
Challenge連線後,會收到兩組透過 RSA 加密的 FLAG $N1 = r * next_prime(r)$ $N2 = p * q$ 並提示 :p,q,r is prime((p-1) % r)**2 + ((r**5 - 1) % p)**2 == 0 So ...
Read more

AIS3 2019 - Random Guess (Crypto, 196)

Linear congruential generator (LCG)
Challenge1234Random number a,b,c :Given the set of number : Ni+1 = (a * Ni + b) % c \n')N = [N0, N1, N2, N3, ... N9]What is the next 100 numb ...
Read more

AIS3 2019 - ReSolveFinaL (Crypto, 481)

LFSR BMA
Challenge檔案 : task.py Solution被加密的輸入為 flag.png 可知其 header : 89 50 4E 47 0D 0A 1A 0A 透過 BMA(Berlekamp Massey Algorithm) 可以得到 LFSR 的 taps 還原出原本的加密 ...
Read more

AIS3 2019 - Tcash (Crypto, 100)

Hash
Challenge檔案 : task.py Solution把 md5, sha 一起考慮進去解,爆搜過去就可以得到正確的 Flag 了。 solve.py AIS3{0N_May_16th @Sead00g said Heeeee ReMEMBerEd tH4t heee UseD th ...
Read more

SecurityFest 2019 - Cactus (Crypto, 1065)

Brute-force Typo
Discription 12integer arithmetic is hardDownload: cactus.tar.gz given file : cactus.py, output.txt 12345678910111213141516171819import randomclas ...
Read more

Volga 2019 - blind (Crypto, 200)

RSA
ChallengeFile : server.py This is a challenge related to digital signature. we can : sign some command call ls or cat after authentication cat ...
Read more

Volga 2019 - shifter (Crypto, 150)

Brute-force LFSR
ChallengeOkay, you already know what to do with it... File : task.py SolutionWe can use Berlekamp Massey Algorithm to find the branch if we know ...
Read more

StarCTF 2019 - notcurves (Crypto, 363)

ECC
ChallengeServer: nc 34.85.45.159 20005File: task.py SolutionThe challenge is broken :( 12345R = self.recvpoint(30)(u,v) = Rprint Rif (u*v)%p == 0 ...
Read more
Prev Next