more
This commit is contained in:
75
vault-door-8/VaultDoor8.java
Executable file
75
vault-door-8/VaultDoor8.java
Executable file
@@ -0,0 +1,75 @@
|
||||
// These pesky special agents keep reverse engineering our source code and then
|
||||
// breaking into our secret vaults. THIS will teach those sneaky sneaks a
|
||||
// lesson.
|
||||
//
|
||||
// -Minion #0891
|
||||
import java.util.*;
|
||||
import javax.crypto.Cipher;
|
||||
import javax.crypto.spec.SecretKeySpec;
|
||||
import java.security.*;
|
||||
|
||||
class VaultDoor8 {
|
||||
public static void main(String args[]) {
|
||||
Scanner b = new Scanner(System.in);
|
||||
System.out.print("Enter vault password: ");
|
||||
String c = b.next();
|
||||
String f = c.substring(8,c.length()-1);
|
||||
VaultDoor8 a = new VaultDoor8();
|
||||
if (a.checkPassword(f)) {
|
||||
System.out.println("Access granted.");
|
||||
}
|
||||
else {
|
||||
System.out.println("Access denied!");
|
||||
}
|
||||
}
|
||||
|
||||
public char[] scramble(String password) {
|
||||
/* Scramble a password by transposing pairs of bits. */
|
||||
char[] a = password.toCharArray();
|
||||
for (int b=0; b<a.length; b++) {
|
||||
char c = a[b];
|
||||
c = switchBits(c,1,2);
|
||||
c = switchBits(c,0,3);
|
||||
/* c = switchBits(c,14,3);
|
||||
* c = switchBits(c, 2, 0); */
|
||||
c = switchBits(c,5,6);
|
||||
c = switchBits(c,4,7);
|
||||
c = switchBits(c,0,1);
|
||||
/* d = switchBits(d, 4, 5);
|
||||
* e = switchBits(e, 5, 6); */
|
||||
c = switchBits(c,3,4);
|
||||
c = switchBits(c,2,5);
|
||||
c = switchBits(c,6,7);
|
||||
a[b] = c;
|
||||
}
|
||||
return a;
|
||||
}
|
||||
|
||||
public char switchBits(char c, int p1, int p2) {
|
||||
/* Move the bit in position p1 to position p2,
|
||||
* and move the bit that was in position p2
|
||||
* to position p1. Precondition: p1 < p2 */
|
||||
char mask1 = (char)(1 << p1);
|
||||
char mask2 = (char)(1 << p2);
|
||||
/* char mask3 = (char)(1<<p1<<p2); mask1++; mask1--; */
|
||||
char bit1 = (char)(c & mask1);
|
||||
char bit2 = (char)(c & mask2);
|
||||
/* System.out.println("bit1 " + Integer.toBinaryString(bit1));
|
||||
* System.out.println("bit2 " + Integer.toBinaryString(bit2)); */
|
||||
char rest = (char)(c & ~(mask1 | mask2));
|
||||
char shift = (char)(p2 - p1);
|
||||
char result = (char)((bit1<<shift) | (bit2>>shift) | rest);
|
||||
return result;
|
||||
}
|
||||
|
||||
public boolean checkPassword(String password) {
|
||||
char[] scrambled = scramble(password);
|
||||
char[] expected = {
|
||||
0xF4, 0xC0, 0x97, 0xF0, 0x77, 0x97, 0xC0, 0xE4,
|
||||
0xF0, 0x77, 0xA4, 0xD0, 0xC5, 0x77, 0xF4, 0x86,
|
||||
0xD0, 0xA5, 0x45, 0x96, 0x27, 0xB5, 0x77, 0xC2,
|
||||
0xD2, 0x95, 0xA4, 0xF0, 0xD2, 0xD2, 0xC1, 0x95 };
|
||||
return Arrays.equals(scrambled, expected);
|
||||
}
|
||||
}
|
||||
|
||||
41
vault-door-8/sol.py
Executable file
41
vault-door-8/sol.py
Executable file
@@ -0,0 +1,41 @@
|
||||
#!/home/maxime/.pyvenv/bin/python3
|
||||
|
||||
def switch(i, a, b):
|
||||
#print(bin(i))
|
||||
|
||||
mask_a = 1<<a
|
||||
mask_b = 1<<b
|
||||
#print(bin(mask_a), bin(mask_b))
|
||||
|
||||
bit_a = i & mask_a
|
||||
bit_b = i & mask_b
|
||||
#print(bin(bit_a), bin(bit_b))
|
||||
|
||||
rest = i & ((mask_a | mask_b) ^ 0xff)
|
||||
#print(bin(rest))
|
||||
|
||||
if bit_a:
|
||||
rest |= mask_b
|
||||
if bit_b:
|
||||
rest |= mask_a
|
||||
#print(bin(rest))
|
||||
#print()
|
||||
|
||||
return rest
|
||||
|
||||
hex = [0xF4, 0xC0, 0x97, 0xF0, 0x77, 0x97, 0xC0, 0xE4, 0xF0, 0x77, 0xA4, 0xD0, 0xC5, 0x77, 0xF4, 0x86,
|
||||
0xD0, 0xA5, 0x45, 0x96, 0x27, 0xB5, 0x77, 0xC2, 0xD2, 0x95, 0xA4, 0xF0, 0xD2, 0xD2, 0xC1, 0x95]
|
||||
|
||||
for c in hex:
|
||||
c = switch(c, 6, 7)
|
||||
c = switch(c, 2, 5)
|
||||
c = switch(c, 3, 4)
|
||||
c = switch(c, 0, 1)
|
||||
c = switch(c, 4, 7)
|
||||
c = switch(c, 5, 6)
|
||||
c = switch(c, 0, 3)
|
||||
c = switch(c, 1, 2)
|
||||
print(chr(c), end='')
|
||||
|
||||
print()
|
||||
|
||||
Reference in New Issue
Block a user