Skip to main content

Cryptography ctf by Avi

Brain fuck and reverse brain fuck cypher: 

https://www.dcode.fr/brainfuck-language

++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>>++++++++++++.<------------------.>+++..++++.--------.+++.--------------.+++++.++++++++++.-----.+.+++++.------------.<---.>----..+.+++++++++.

The reverse brain fuck starts with the - (minus) sign.

https://www.dcode.fr/langage-reversefuck

----------]<-<---<-------<---------->>>>+[<<<+++,<---------------------,+++++++++++++++++++++++,---,-------------,++++++++++++++++,+,-------------,+++++++,-----,+++++++++++,--------------------------,>-------------,<++,+++++,++++++++++++,-------,+,>>--,<<+++++,----------,>>,<<+++++++++++++++++,---,--------------,-,>>,<<++++,--,+++,++++++++,-----------,>-----------------,<+++++,++++,-----,>------,>,<<++,>++++++,<--,>------,<-------,>++++++,------,++,<--------,

#############################################################################

 Twin-hex encoder/decoder

https://www.calcresult.com/misc/cyphers/twin-hex.html

https://www.calcresult.com/misc/cyphers/twin-hex.html?fbclid=IwAR01RuXBGaYEPmvp2BNaSaFFSq6MRM8RFnp0ydVZZ0tKizMs70fN2LiyoBY

3836rt4p05wf3gv69r3bj6f94pl5x14pa5wt4vi6w0 à twin-hex string

#############################################################################

Caesar cypher:

https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript

https://www.xarg.org/tools/caesar-cipher/

These are also called ROT cyphers. (ROT 13/47)

#############################################################################

Enigma machine:


#############################################################################

md5 hash decryptor:


#############################################################################

Cypher identifier:



#############################################################################

CyberChef for lots of cypher decode:


#############################################################################

L33T 1337 L337 encryption:

http://www.robertecker.com/hp/research/leet-converter.php?lang=en

https://www.dcode.fr/leet-speak-1337

#############################################################################

Gravity Falls bill cypher:

#############################################################################






#############################################################################

Wingdings font cypher:










#############################################################################

base 36 cypher alphanumerals:



#############################################################################

One-time pad cryptography:

https://www.boxentriq.com/code-breaking/one-time-pad

#############################################################################


#############################################################################

Vigenere cipher decoder:

https://www.guballa.de/vigenere-solver

In this type of cypher, a decryption key is given. 

#############################################################################

Binary to ASCII converter:

https://mothereff.in/binary-ascii

#############################################################################



#############################################################################


Decimal>hex>ascii

581695969015253365094191591547859387620042736036246486373595515576333693

decimal to ascii converter

85 110 112 97 99 107 32 116 104 105 115 32 66 67 68

#############################################################################

Soundcloud:

Soundcloud audio converter then downloads

https://www.klickaud.co/

Speech to text demo

https://speech-to-text-demo.ng.bluemix.net/

#############################################################################

XOR:

S1: 44585d6b2368737c65252166234f20626d

S2: 1010101010101010101010101010101010

After hex the S1 from cyberchef we shall get an encrypted code. Then we need to XOR that encrypted code using S2 as key. 

#############################################################################


Morse code:

Morse code audio decoder online:

https://morsecode.world/international/decoder/audio-decoder-adaptive.html

 - . .-.. . -.-. --- -- -- ..- -. .. -.-. .- - .. --- -.

#############################################################################

Bacon cipher:

A= not bold

B= bold



#############################################################################

Alphabetical Substitution cipher:

Xbyviyzmtoz{Zoozs rh Lmob Lmv}

Generally, small cypher is given like, XVGSTR

#############################################################################

Atbash mirror cipher:

Atbash cipher

Xbyviyzmtoz{Zoozs rh Lmob Lmv}

Xbyviyzmtoz{zgyzhs_rh_zohl_pmldm_zh_nriili_xrksvi}

Note: alphabetical substitution cypher and atbash cypher might give the same result sometimes. And atbash cypher starts from the end. 

ABCDEFGHIJKLMNOPQRSTUVWXYZ

ZYXWVUTSRQPONMLKJIHGFEDCBA

#############################################################################

Rail fence cipher:

#############################################################################

Encoding:

Base-32/58/32/64

echo "4ziTFWdzXc" | base58 -d

echo “7jVMLrWDJYbRiCkpEiHFKTdxp1papAFCg6rukKLnFszLUg7W” | base58 -d 

#############################################################################

Tap code:

.. .... .... .... .... ... .... .... . . ... ..... . ..... . ... ... .... . .... . .....

#############################################################################


Emoji cypher:

























#############################################################################

JS fuck cypher / language:
































#############################################################################

Sometimes you need to decode a hex value. The decoding result may come as garbage. But you need to then xor that if the author gives any key. We know in xor, a key is needed. 

#############################################################################

Deep Sound:
 
In order to solve audio related ctf challenge, deep sound windows tool can help in some cases. Sonic visualizer is for linux tool. 
 
#####################################################################


Keyboard cypher:

Hint: See on the keyboard for 2 minutes.

BUH~U>|:TIM{DYG~FKPHU~BP}KTYQ

As the hint says, need to watch on keyboard for 2 minutes so we can shift 2. 



#####################################################################


Someone took my bytes. Can you recover my password for me? In this challenge an encrypted code or text is given. In this case you can upload the file to cyber chef to see the tool can detect what encryption is used there. Then you can use xor or xor brute force algorithm to see any readable text can be recovered or not. Scroll from top to bottom. If found something like that starts with PK and password.txt and key is ff then it is your focusing point.


#####################################################################


hex to ascii:

72 74 63 70 7b 62 6f 62 5f 79 6f 75 5f 73 75 63 6b 5f 61 74 5f 62 65 69 6e 67 5f 65 6e 63 6f 75 72 61 67 69 6e 67 7d

It is base 16 or hexadecimal string convert from hexadecimal to ascii to get the flag

#####################################################################

Octal to ascii representation:

162 164 143 160 173 163 165 145 137 155 145 137 151 137 144 151 144 156 164 137 153 156 157 167 137 167 150 141 164 137 157 143 164 141 154 137 167 141 163 137 157 153 141 171 77 41 175 

this is given which is in octal representation

Convert this octal to ascii to get the flag.

#####################################################################

A1Z26 cypher: letter number cypher

A set of number is given 26 26 26 26 26 26 26 26 19 12 5 5 16 9 14 7 9 14 16 8 25 19 9 3 19

Here we can observe numbers range from 1-26 hence we can say it is A1Z26 cipher which can be decoded also as A=1, B=2, C=3, …, Z=26.

#####################################################################
 
If caesar cypher does not work then try atbash cipher. 
 
#####################################################################
 
 
beacon related to binary:
 
The question gives binary numbers 00110 01110 00100 00000 10011 00101 01110 01110 00011 00011 01110 01101 10011 10010 10011 00000 10001 10101 00100 . We can use these binary numbers to convert to text using Bacon cipher as given in question. Bacon cipher uses ‘a’ and ‘b’ which can be taken as a=0 and b=1 or vice versa.
 

#####################################################################
 
 Substitution cypher:
 
This is not final output as this can be decoded again using substitution ciphers which is abcdefghijklmnopqrstuvwxyz=mlkjihgfedcbazyxwvutsrqpon where from half of alphabets is reversed just like Porta Cipher but with an extra shift.
 
abcdefghijklmnopqrstuvwxyz
mlkjihgfedcbazyxwvutsrqpon 
 
zeziyvzyzi =  Hence we know z=n, e=i, z=n, i=e, y=o, v=r, z=n, y=o, z=n, i=e which gives flag as nineornone  
 
#####################################################################
 
Matrix algorithm ctf:
 
https://matrix.reshish.com/multiplication.php
 
 
#####################################################################
 
SKATS and Hangul language:
 
 
#####################################################################
 
 
RSA encryption decryption:
 
 
#####################################################################  
 
space and * cypher:
 
replace all space with 1 and replace all * with 0 will give you a binary number. Decode it from cyber chef. 
 
#####################################################################

Comments

Popular posts from this blog

API hacking lab setup

 Follow the commands to install and configure API hacking lab: 1. Install kali linux and update all the packages.  apt update -y apt upgrade -y or apt dist-upgrade -y or apt full-upgrade -y If you face any problem regarding update, install cloud flare warp in the host machine, then again start updating packages in your kali vm.  2. Install and configure burpsuite professional.  Open burpsuite and go to Extender tab. Click on BAppStore. Search for Autorize extension, It will help us to automate authorization testing. Click on Download Jython. From Jython website click on Jython standalone and save it. Go to Extender > Options and under python environment select the jython jar file that you just downloaded. Now again go to BAppStore and re-search for Autorize extension. You will see Install option this time after selecting Autorize extension. Install it. You will see all the installed extensions under Extender > Extensions tab.  3. Install foxy proxy to prox...

Installing Codename SCNR web application scanner on ubuntu | kali

  Perform the following steps from a non-root user. We will go for manual installation.  https://github.com/scnr/installer?tab=readme-ov-file#manual-installation https://github.com/scnr/installer/releases wget https://github.com/scnr/installer/releases/download/v1.7.3/scnr-v1.7.3-linux-x86_64.tar.gz   (Download using normal user) tar -xvzf scnr-v1.7.3-linux-x86_64.tar.gz cd scnr-v1.7.3 cd bin Now go to their website ( https://ecsypno.com/products/scnr ) and subscribe for community edition license from your official email.  ./scnr_activate 6XQ97FW3LVBECD0UJ5H214 ./scnr https://www.example.net/Login.aspx --system-slots-override Now they generate .ser format report after testing the application by default which is hard to read. We need html report. So for example, to generate an HTML report: ./scnr_reporter --report=html:outfile=my_report.html.zip /home/user/.scnr/reports/report.ser Avi

Install Nessus from docker

Docker installation. Give the below commands one by one. apt install docker-cli or apt install docker.io After the installation is complete, if you are inside wsl then give this command to start docker, because inside wsl systemd (systemctl) does not work: service docker start WSL troubleshooting : If the above command " service docker start " does not work then use below command: dockerd (It may not work if any previous docker process is running. It will show you pid of that process. Use this command to kill that process " kill -9 pid " and run dockerd command again) If " docker ps -a " giving error like " Cannot connect to the Docker daemon at unix:///run/podman/podman.sock. Is the docker daemon running? " This is because you may installed podman-docker package. If you remove the package still you will get this error but you should remove the package. Then issue this command: env | grep -i docker DOCKER_HOST=unix:///run/podman/podman.sock   --...