some more playlist stuff
This commit is contained in:
19
python_in_ctf/fixme_1/fixme1.py
Executable file
19
python_in_ctf/fixme_1/fixme1.py
Executable file
@@ -0,0 +1,19 @@
|
||||
#!/home/maxime/.pyvenv/bin/python3
|
||||
import random
|
||||
|
||||
def str_xor(secret, key):
|
||||
#extend key to secret length
|
||||
new_key = key
|
||||
i = 0
|
||||
while len(new_key) < len(secret):
|
||||
new_key = new_key + key[i]
|
||||
i = (i + 1) % len(key)
|
||||
return "".join([chr(ord(secret_c) ^ ord(new_key_c)) for (secret_c,new_key_c) in zip(secret,new_key)])
|
||||
|
||||
|
||||
flag_enc = chr(0x15) + chr(0x07) + chr(0x08) + chr(0x06) + chr(0x27) + chr(0x21) + chr(0x23) + chr(0x15) + chr(0x5a) + chr(0x07) + chr(0x00) + chr(0x46) + chr(0x0b) + chr(0x1a) + chr(0x5a) + chr(0x1d) + chr(0x1d) + chr(0x2a) + chr(0x06) + chr(0x1c) + chr(0x5a) + chr(0x5c) + chr(0x55) + chr(0x40) + chr(0x3a) + chr(0x58) + chr(0x0a) + chr(0x5d) + chr(0x53) + chr(0x43) + chr(0x06) + chr(0x56) + chr(0x0d) + chr(0x14)
|
||||
|
||||
|
||||
flag = str_xor(flag_enc, 'enkidu')
|
||||
print('That is correct! Here\'s your flag: ' + flag)
|
||||
|
||||
25
python_in_ctf/fixme_2/fixme2.py
Executable file
25
python_in_ctf/fixme_2/fixme2.py
Executable file
@@ -0,0 +1,25 @@
|
||||
#!/home/maxime/.pyvenv/bin/python3
|
||||
import random
|
||||
|
||||
def str_xor(secret, key):
|
||||
#extend key to secret length
|
||||
new_key = key
|
||||
i = 0
|
||||
while len(new_key) < len(secret):
|
||||
new_key = new_key + key[i]
|
||||
i = (i + 1) % len(key)
|
||||
return "".join([chr(ord(secret_c) ^ ord(new_key_c)) for (secret_c,new_key_c) in zip(secret,new_key)])
|
||||
|
||||
|
||||
flag_enc = chr(0x15) + chr(0x07) + chr(0x08) + chr(0x06) + chr(0x27) + chr(0x21) + chr(0x23) + chr(0x15) + chr(0x58) + chr(0x18) + chr(0x11) + chr(0x41) + chr(0x09) + chr(0x5f) + chr(0x1f) + chr(0x10) + chr(0x3b) + chr(0x1b) + chr(0x55) + chr(0x1a) + chr(0x34) + chr(0x5d) + chr(0x51) + chr(0x40) + chr(0x54) + chr(0x09) + chr(0x05) + chr(0x04) + chr(0x57) + chr(0x1b) + chr(0x11) + chr(0x31) + chr(0x0d) + chr(0x5f) + chr(0x05) + chr(0x40) + chr(0x04) + chr(0x0b) + chr(0x0d) + chr(0x0a) + chr(0x19)
|
||||
|
||||
|
||||
flag = str_xor(flag_enc, 'enkidu')
|
||||
|
||||
# Check that flag is not empty
|
||||
if flag == "":
|
||||
print('String XOR encountered a problem, quitting.')
|
||||
else:
|
||||
print('That is correct! Here\'s your flag: ' + flag)
|
||||
|
||||
|
||||
BIN
python_in_ctf/pw_crack_1/level1.flag.txt.enc
Executable file
BIN
python_in_ctf/pw_crack_1/level1.flag.txt.enc
Executable file
Binary file not shown.
29
python_in_ctf/pw_crack_1/level1.py
Executable file
29
python_in_ctf/pw_crack_1/level1.py
Executable file
@@ -0,0 +1,29 @@
|
||||
#!/home/maxime/.pyvenv/bin/python3
|
||||
### THIS FUNCTION WILL NOT HELP YOU FIND THE FLAG --LT ########################
|
||||
def str_xor(secret, key):
|
||||
#extend key to secret length
|
||||
new_key = key
|
||||
i = 0
|
||||
while len(new_key) < len(secret):
|
||||
new_key = new_key + key[i]
|
||||
i = (i + 1) % len(key)
|
||||
return "".join([chr(ord(secret_c) ^ ord(new_key_c)) for (secret_c,new_key_c) in zip(secret,new_key)])
|
||||
###############################################################################
|
||||
|
||||
|
||||
flag_enc = open('level1.flag.txt.enc', 'rb').read()
|
||||
|
||||
|
||||
|
||||
def level_1_pw_check():
|
||||
user_pw = input("Please enter correct password for flag: ")
|
||||
if( user_pw == "8713"):
|
||||
print("Welcome back... your flag, user:")
|
||||
decryption = str_xor(flag_enc.decode(), user_pw)
|
||||
print(decryption)
|
||||
return
|
||||
print("That password is incorrect")
|
||||
|
||||
|
||||
|
||||
level_1_pw_check()
|
||||
BIN
python_in_ctf/pw_crack_2/level2.flag.txt.enc
Executable file
BIN
python_in_ctf/pw_crack_2/level2.flag.txt.enc
Executable file
Binary file not shown.
28
python_in_ctf/pw_crack_2/level2.py
Executable file
28
python_in_ctf/pw_crack_2/level2.py
Executable file
@@ -0,0 +1,28 @@
|
||||
#!/home/maxime/.pyvenv/bin/python3
|
||||
### THIS FUNCTION WILL NOT HELP YOU FIND THE FLAG --LT ########################
|
||||
def str_xor(secret, key):
|
||||
#extend key to secret length
|
||||
new_key = key
|
||||
i = 0
|
||||
while len(new_key) < len(secret):
|
||||
new_key = new_key + key[i]
|
||||
i = (i + 1) % len(key)
|
||||
return "".join([chr(ord(secret_c) ^ ord(new_key_c)) for (secret_c,new_key_c) in zip(secret,new_key)])
|
||||
###############################################################################
|
||||
|
||||
flag_enc = open('level2.flag.txt.enc', 'rb').read()
|
||||
|
||||
|
||||
|
||||
def level_2_pw_check():
|
||||
user_pw = input("Please enter correct password for flag: ")
|
||||
if( user_pw == chr(0x34) + chr(0x65) + chr(0x63) + chr(0x39) ):
|
||||
print("Welcome back... your flag, user:")
|
||||
decryption = str_xor(flag_enc.decode(), user_pw)
|
||||
print(decryption)
|
||||
return
|
||||
print("That password is incorrect")
|
||||
|
||||
|
||||
|
||||
level_2_pw_check()
|
||||
Reference in New Issue
Block a user