Skip to content

Commit fbd369e

Browse files
committed
Added 3 more writeups
1 parent 04fba91 commit fbd369e

File tree

3 files changed

+99
-0
lines changed

3 files changed

+99
-0
lines changed

cryptography/decode-me-100-points.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# Decode Me - 100 points
2+
3+
Someone I met today told me that they had a perfect encryption method. To prove that there is no such thing, I want you to decrypt this [encrypted flag](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/decode-me/encrypted_flag.txt) he gave me.
4+
5+
### Solution
6+
###### Writeup by Valar Dragon
7+
8+
The input file ends in the iconic `=` sign, hinting at base64.
9+
And it b64 decodes, into another base64 string. So I wrote a short python3 script to perform repeated base64 decryption
10+
11+
``` python
12+
import base64
13+
14+
a = open('begin').read()
15+
a = a.replace('\n','').replace('\\n','')
16+
b64 = str(base64.standard_b64decode(a),'utf-8')
17+
18+
while 'easyctf' not in b64:
19+
b64 = str(base64.standard_b64decode(b64),'utf-8')
20+
print(b64)
21+
```
22+
23+
which gives the flag
24+
``` bash
25+
$ python3 solve.py
26+
easyctf{what_1s_l0v3_bby_don7_hurt_m3}
27+
```
28+
29+
30+
### External Writeups
31+
32+
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Decode%20Me/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Decode%20Me/README.md)

forensics/mane-event-50-points.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# Mane Event - 50 points
2+
3+
My friend just got back from the plains and he took [this](https://raw.githubusercontent.com/EasyCTF/easyctf-2017-problems/master/mane-event/lion.jpg) picture with his new camera. He also told me there's a flag hidden in it - can you check it out for me?
4+
5+
### Solution
6+
###### Writeup by Valar Dragon
7+
8+
![mane_event.jpg](https://raw.githubusercontent.com/EasyCTF/easyctf-2017-problems/master/mane-event/lion.jpg)
9+
10+
This is a great looking picture! Except it looks pretty normal, I doubt the flag has to do with manipulating pixels for only 50 points.
11+
12+
Lets just see if the flag is in there as plaintext!
13+
14+
``` bash
15+
$ cat mane_event.jpg | grep easyctf
16+
Binary file (standard input) matches
17+
```
18+
19+
So the flag is in there as plaintext!
20+
You can open your favorite hex editor, and search through the hexdump and try to find the flag, but you can also get the flag without leaving the command line!
21+
22+
``` bash
23+
$ cat mane_event.jpg | hexdump -c | grep 'e a s' -A 2 | sed 's/ //g'
24+
00016c0sts,easyctf{prid
25+
00016d0e_in_african_eng
26+
00016e0in33ring},2011B
27+
```
28+
Note that the reason for hexdump -c is so that grep doesn't interpret mane_event.jpg as a binary file. So we get the output with some spaces in between the chars! Then sed is removing the spaces.
29+
30+
Our flag is then:
31+
`easyctf{pride_in_african_engin33ring}`
32+
33+
### External Writeups
34+
35+
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Mane%20Event/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Mane%20Event/README.md)
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# Petty Difference - 75 points
2+
3+
I found two files in a secret room. They look like jumbled letters with no patterns. I mean look at it! [file1](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/petty-difference/file1.txt) is identical to [file2](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/petty-difference/file2.txt), right?
4+
5+
### Solution
6+
###### Writeup by Valar Dragon
7+
8+
Since it mentions the files being identical, lets look at the differing bytes!
9+
10+
``` python
11+
a = open('file1').read()
12+
b = open('file2').read()
13+
c = ""
14+
d = ""
15+
for i in range(len(a)):
16+
if(a[i]!=b[i]):
17+
c += a[i]
18+
d += b[i]
19+
print(c)
20+
print(d)
21+
```
22+
23+
which gives the flag!
24+
``` bash
25+
$ python3 solve.py
26+
easyctf{th1s_m4y_b3_th3_d1ff3r3nc3_y0u_w3r3_l00k1ng_4}
27+
lfbz95eobcrtqadt7kdxz0dcisw{x5kik4pueriiebmavwnxdvwex9
28+
```
29+
30+
### External Writeups
31+
32+
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Petty%20Difference/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/Petty%20Difference/README.md)

0 commit comments

Comments
 (0)