Skip to main content

Cryptography ctf by Avi

Brain fuck and reverse brain fuck cypher: 

https://www.dcode.fr/brainfuck-language

++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>>++++++++++++.<------------------.>+++..++++.--------.+++.--------------.+++++.++++++++++.-----.+.+++++.------------.<---.>----..+.+++++++++.

The reverse brain fuck starts with the - (minus) sign.

https://www.dcode.fr/langage-reversefuck

----------]<-<---<-------<---------->>>>+[<<<+++,<---------------------,+++++++++++++++++++++++,---,-------------,++++++++++++++++,+,-------------,+++++++,-----,+++++++++++,--------------------------,>-------------,<++,+++++,++++++++++++,-------,+,>>--,<<+++++,----------,>>,<<+++++++++++++++++,---,--------------,-,>>,<<++++,--,+++,++++++++,-----------,>-----------------,<+++++,++++,-----,>------,>,<<++,>++++++,<--,>------,<-------,>++++++,------,++,<--------,

#############################################################################

 Twin-hex encoder/decoder

https://www.calcresult.com/misc/cyphers/twin-hex.html

https://www.calcresult.com/misc/cyphers/twin-hex.html?fbclid=IwAR01RuXBGaYEPmvp2BNaSaFFSq6MRM8RFnp0ydVZZ0tKizMs70fN2LiyoBY

3836rt4p05wf3gv69r3bj6f94pl5x14pa5wt4vi6w0 à twin-hex string

#############################################################################

Caesar cypher:

https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript

https://www.xarg.org/tools/caesar-cipher/

These are also called ROT cyphers. (ROT 13/47)

#############################################################################

Enigma machine:


#############################################################################

md5 hash decryptor:


#############################################################################

Cypher identifier:



#############################################################################

CyberChef for lots of cypher decode:


#############################################################################

L33T 1337 L337 encryption:

http://www.robertecker.com/hp/research/leet-converter.php?lang=en

https://www.dcode.fr/leet-speak-1337

#############################################################################

Gravity Falls bill cypher:

#############################################################################






#############################################################################

Wingdings font cypher:










#############################################################################

base 36 cypher alphanumerals:



#############################################################################

One-time pad cryptography:

https://www.boxentriq.com/code-breaking/one-time-pad

#############################################################################


#############################################################################

Vigenere cipher decoder:

https://www.guballa.de/vigenere-solver

In this type of cypher, a decryption key is given. 

#############################################################################

Binary to ASCII converter:

https://mothereff.in/binary-ascii

#############################################################################



#############################################################################


Decimal>hex>ascii

581695969015253365094191591547859387620042736036246486373595515576333693

decimal to ascii converter

85 110 112 97 99 107 32 116 104 105 115 32 66 67 68

#############################################################################

Soundcloud:

Soundcloud audio converter then downloads

https://www.klickaud.co/

Speech to text demo

https://speech-to-text-demo.ng.bluemix.net/

#############################################################################

XOR:

S1: 44585d6b2368737c65252166234f20626d

S2: 1010101010101010101010101010101010

After hex the S1 from cyberchef we shall get an encrypted code. Then we need to XOR that encrypted code using S2 as key. 

#############################################################################


Morse code:

Morse code audio decoder online:

https://morsecode.world/international/decoder/audio-decoder-adaptive.html

 - . .-.. . -.-. --- -- -- ..- -. .. -.-. .- - .. --- -.

#############################################################################

Bacon cipher:

A= not bold

B= bold



#############################################################################

Alphabetical Substitution cipher:

Xbyviyzmtoz{Zoozs rh Lmob Lmv}

Generally, small cypher is given like, XVGSTR

#############################################################################

Atbash mirror cipher:

Atbash cipher

Xbyviyzmtoz{Zoozs rh Lmob Lmv}

Xbyviyzmtoz{zgyzhs_rh_zohl_pmldm_zh_nriili_xrksvi}

Note: alphabetical substitution cypher and atbash cypher might give the same result sometimes. And atbash cypher starts from the end. 

ABCDEFGHIJKLMNOPQRSTUVWXYZ

ZYXWVUTSRQPONMLKJIHGFEDCBA

#############################################################################

Rail fence cipher:

#############################################################################

Encoding:

Base-32/58/32/64

echo "4ziTFWdzXc" | base58 -d

echo “7jVMLrWDJYbRiCkpEiHFKTdxp1papAFCg6rukKLnFszLUg7W” | base58 -d 

#############################################################################

Tap code:

.. .... .... .... .... ... .... .... . . ... ..... . ..... . ... ... .... . .... . .....

#############################################################################


Emoji cypher:

























#############################################################################

JS fuck cypher / language:
































#############################################################################

Sometimes you need to decode a hex value. The decoding result may come as garbage. But you need to then xor that if the author gives any key. We know in xor, a key is needed. 

#############################################################################

Deep Sound:
 
In order to solve audio related ctf challenge, deep sound windows tool can help in some cases. Sonic visualizer is for linux tool. 
 
#####################################################################


Keyboard cypher:

Hint: See on the keyboard for 2 minutes.

BUH~U>|:TIM{DYG~FKPHU~BP}KTYQ

As the hint says, need to watch on keyboard for 2 minutes so we can shift 2. 



#####################################################################


Someone took my bytes. Can you recover my password for me? In this challenge an encrypted code or text is given. In this case you can upload the file to cyber chef to see the tool can detect what encryption is used there. Then you can use xor or xor brute force algorithm to see any readable text can be recovered or not. Scroll from top to bottom. If found something like that starts with PK and password.txt and key is ff then it is your focusing point.


#####################################################################


hex to ascii:

72 74 63 70 7b 62 6f 62 5f 79 6f 75 5f 73 75 63 6b 5f 61 74 5f 62 65 69 6e 67 5f 65 6e 63 6f 75 72 61 67 69 6e 67 7d

It is base 16 or hexadecimal string convert from hexadecimal to ascii to get the flag

#####################################################################

Octal to ascii representation:

162 164 143 160 173 163 165 145 137 155 145 137 151 137 144 151 144 156 164 137 153 156 157 167 137 167 150 141 164 137 157 143 164 141 154 137 167 141 163 137 157 153 141 171 77 41 175 

this is given which is in octal representation

Convert this octal to ascii to get the flag.

#####################################################################

A1Z26 cypher: letter number cypher

A set of number is given 26 26 26 26 26 26 26 26 19 12 5 5 16 9 14 7 9 14 16 8 25 19 9 3 19

Here we can observe numbers range from 1-26 hence we can say it is A1Z26 cipher which can be decoded also as A=1, B=2, C=3, …, Z=26.

#####################################################################
 
If caesar cypher does not work then try atbash cipher. 
 
#####################################################################
 
 
beacon related to binary:
 
The question gives binary numbers 00110 01110 00100 00000 10011 00101 01110 01110 00011 00011 01110 01101 10011 10010 10011 00000 10001 10101 00100 . We can use these binary numbers to convert to text using Bacon cipher as given in question. Bacon cipher uses ‘a’ and ‘b’ which can be taken as a=0 and b=1 or vice versa.
 

#####################################################################
 
 Substitution cypher:
 
This is not final output as this can be decoded again using substitution ciphers which is abcdefghijklmnopqrstuvwxyz=mlkjihgfedcbazyxwvutsrqpon where from half of alphabets is reversed just like Porta Cipher but with an extra shift.
 
abcdefghijklmnopqrstuvwxyz
mlkjihgfedcbazyxwvutsrqpon 
 
zeziyvzyzi =  Hence we know z=n, e=i, z=n, i=e, y=o, v=r, z=n, y=o, z=n, i=e which gives flag as nineornone  
 
#####################################################################
 
Matrix algorithm ctf:
 
https://matrix.reshish.com/multiplication.php
 
 
#####################################################################
 
SKATS and Hangul language:
 
 
#####################################################################
 
 
RSA encryption decryption:
 
 
#####################################################################  
 
space and * cypher:
 
replace all space with 1 and replace all * with 0 will give you a binary number. Decode it from cyber chef. 
 
#####################################################################

Comments

Popular posts from this blog

Installtion of SQLMutant tool

This tool is perfectly works on ubuntu 24 system. And I found it is not working properly in kali linux 24 version.   https://github.com/blackhatethicalhacking/SQLMutant/tree/main This tool need to use along with sqlmap tool. Showing this cheat sheet for kali or debian based system.  This tool actually analyze everything and give you the vulnerable url where sql injection is possible. You just need to use then sqlmap to exploit that.   Prerequisite: apt install pipx -y (for ubuntu) pip3 install uro or pipx install uro pipx ensurepath pipx completions  (not needed)  source ~/.bashrc   or restart system If go tool is not installed then run the below two commands first ( golang-go ) or follow this link to install go (https://mahimfiroj.blogspot.com/2024/12/installing-nuclei-in-kali.html) otherwise skip this step.   dpkg -l | grep packagename (Using this command you can check package is installed or not) apt install gccgo-go -y or apt install gol...

Install Nessus from docker

Docker installation. Give the below commands one by one. apt install docker-cli or apt install docker.io After the installation is complete, if you are inside wsl then give this command to start docker, because inside wsl systemd (systemctl) does not work: service docker start WSL troubleshooting : If the above command " service docker start " does not work then use below command: dockerd (It may not work if any previous docker process is running. It will show you pid of that process. Use this command to kill that process " kill -9 pid " and run dockerd command again) If " docker ps -a " giving error like " Cannot connect to the Docker daemon at unix:///run/podman/podman.sock. Is the docker daemon running? " This is because you may installed podman-docker package. If you remove the package still you will get this error but you should remove the package. Then issue this command: env | grep -i docker DOCKER_HOST=unix:///run/podman/podman.sock   --...

WSL - windows subsystem for linux

  1. From the start menu, type "Turn Windows features on or off". Check the box, Virtual Machine Platform and Windows Subsystem for Linux or in the command prompt simply give this command: wsl.exe --install --no-distribution Now Restart the system.  If wsl is already installed, then give this command: wsl.exe --update 2. Now from Microsoft store download kali linux and install it. Or you can give this command to see list of distributions. Then install based on your choice.  To see list of distributions: wsl.exe --list --online To install: wsl.exe --install --distribution <Distro Name> i.e.  wsl --install --distribution kali-linux 3. Now it will ask for username and password, say at the time of installing kali-linux here. Provide that.  4. Once it is installed, it has come with very minimum package installation.  Run the following commands to install all packages: sudo apt update sudo apt full-upgrade -y sudo apt install -y kali-linux-default (This re...