MasterWard Profile
  • Introduction
  • Media Links
  • Resume
  • HackThebox Notes
    • RedPanda
    • Metatwo
  • CTF Contest Writeups
    • 2017
      • Takoma Park CTF
      • TUCTF 2017
      • HITCON CTF 2017 Quals
      • CSAW CTF Qualification Round 2017
      • SEC-T CTF
      • Backdoor CTF 2017
      • Hack Dat Kiwi 2017
      • Kaspersky 2017
      • Hack.lu 2017
      • HackCon 2017
      • Defcamp 2017
      • Square CTF 2017
      • Mitre 2017
      • EKOPARTY CTF 2017
    • 2018
      • SEC-T CTF
      • Hackcon 2018
      • EasyCTF IV 2018
      • DefCamp CTF Qualifiers
      • PACTF 2018
      • CSAW CTF Qualifiers 2018
      • PicoCTF 2018
    • 2019
      • Newark Academy CTF 2019
      • Crypto CTF 2019
      • PicoCTF 2019
        • General Skills
        • Binary Exploitations
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • TAMUctf 19
    • 2021
      • picoCTF 2021
        • General Skills
        • Binary Exploitation
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • HackiHoli
      • S.H.E.L.L CTF
      • DawgCTF 2021
      • TCTF 2021
      • RedPwnCTF 2021
      • IJCTF 2021
      • UIUCTF 2021
      • Really Awesome CTF 2021
      • TMUCTF 2021
      • CSAW Qualifiers 2021
      • Pbjar CTF 2021
      • Deadface CTF 2021
    • 2022
      • NahamCon CTF 2022
      • BYUCTF 2022
      • DEF CON Qualifiers 2022
    • Useful Code
  • Software
    • Video Standardization and Compression
    • TOBIAS
    • Tracking Phone
    • Image Compression
    • Do Not Call Database
    • Color Blind Simulator
    • Gmail Unsubscriber
    • MP4 to GIF Converter
    • Optical Character Reading
    • Soft Jobs
    • OBD Project
    • Online Movie Finder
    • Work In Progress
      • Incremental Backup
      • Web Scraper - Wallpaper Edition
      • Web Blocker
      • File Manipulator
      • AppFiller
      • Cyber Security Projects
      • Bsaber AI
    • Ideas
      • CAN Programming
      • Malicious Programs
      • Remove Yourself from the Internet
      • DNA Classic
      • Auto Clicker
      • Adding Depth to a Video
      • Collage Mosaic Generator
      • Game Destroyer
      • Hearing aid Technology
      • Sign Language Recognition
      • Text Summarizer
      • Video to audio to text
      • Video Object Detection
      • VR demonstration
      • More Ideas to Elaborate on
    • Failure
      • Police Camera Radar
      • Already Created
      • Google Maps Game
      • Car price prediction
      • Bullshit Detector
      • Automated Code writter
      • Career Prediction
      • Samsung Remote Control Hack
      • Invalid Finder
      • PiHole Regex Filter
      • Group Archiver
  • Additional Articles
    • Cleaning Up a Computer Tricks
    • Getting started in Cyber Security
    • Speeding Up Your Internet
    • College Experience
    • Currently Writting
      • Reverse Engineering Notes
      • Bug Bounty Guide and Examples
      • OSCP help
      • Job Experience
      • Professional Job-Hunting Experience
Powered by GitBook
On this page
  • The Numbers [50 pts]
  • Easy1 [100 pts] [Not Solved]
  • 13 [100 pts]
  • caesar [100 pts]
  • la cifra de [200 pts] [Not Solved]
  • Tapping [200 pts]
  • Flags [200 pts] [Not Solved]
  • Mr-Worldwide [200 pts] [Not Solved]
  • rsa-pop-quiz [200 pts] [Not Solved]
  • waves over lambda [300 pts] [Not Solved]
  • miniRSA [300 pts] [Not Solved]
  • b00tl3gRSA2 [400 pts] [Not Solved]
  • AES-ABC [400 pts] [Not Solved]
  • b00tl3gRSA3 [450 pts] [Not Solved]
  • john_pollard [500 pts] [Not Solved]

Was this helpful?

  1. CTF Contest Writeups
  2. 2019
  3. PicoCTF 2019

Cryptography

PreviousReverse EngineeringNextWeb Exploitation

Last updated 3 years ago

Was this helpful?

The Numbers [50 pts]

Description

The ... what do they mean?

Solution

Given 16 9 3 15 3 20 6 { = picoCTF [given that is the format] 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 a b c d e f g h i j k l m n o p q r s t u v w x y z Thus 20 8 5 14 21 13 2 5 18 19 13 1 19 15 14 } = thenumbersmason}

Flag: PICOCTF{THENUMBERSMASON}

Easy1 [100 pts] [Not Solved]

Description

The one time pad can be cryptographically secure, but not when you know the key. Can you solve this? We've given you the encrypted flag, key, and a table to help UFJKXQZQUNB with the key of SOLVECRYPTO. Can you use this to solve it?.

Solution

a

Flag:

13 [100 pts]

Description

Cryptography can be easy, do you know what ROT13 is? cvpbPGS{abg_gbb_onq_bs_n_ceboyrz}

Solution

I could just go to an online converter, BUT I decided to write the code myself.

enc_message = 'cvpbPGS{abg_gbb_onq_bs_n_ceboyrz}'
message = ""
rot = 13
alphabet = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ'
for c in enc_message:
	try:
		index = alphabet.index(c)
		new_letter = alphabet[(index + rot )% len(alphabet)]
		if index < 26: # Fix mismatched casing
			message += new_letter.lower()
		elif index > 26:
			message += new_letter.upper()
	except: # Doesn't exist in alphabet
		message += c
		continue
print(message)

Flag: picoCTF{not_too_bad_of_a_problem}

caesar [100 pts]

Description

Solution

Reusing the code from earlier with a little modification because we need to try all possibilities to get to this point I made this code

enc_message = '{dspttjohuifsvcjdpoabrkttds}'
alphabet = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ'
for shift in range(0, 26): # Shift 1 to 25 letters (26 would be no shift)
	message = ''
	for c in enc_message:
		try:
			index = alphabet.index(c)
			new_letter = alphabet[(index + shift)% len(alphabet)]
			if index < 26: # Fix mismatched casing
				message += new_letter.lower()
			elif index > 26:
				message += new_letter.upper()
		except: # Doesn't exist in alphabet
			message += c
			continue
	print(str(shift) + " " + message)

Flag: picoCTF{crossingtherubiconzaqjsscr}

la cifra de [200 pts] [Not Solved]

Description

I found this cipher in an old book. Can you figure out what it says? Connect with nc jupiter.challenges.picoctf.org 32411.

Solution

When type in the command it returns

Encrypted message: Ne iy nytkwpsznyg nth it mtsztcy vjzprj zfzjy rkhpibj nrkitt ltc tnnygy ysee itd tte cxjltk

Ifrosr tnj noawde uk siyyzre, yse Bnretèwp Cousex mls hjpn xjtnbjytki xatd eisjd

Iz bls lfwskqj azycihzeej yz Brftsk ip Volpnèxj ls oy hay tcimnyarqj dkxnrogpd os 1553 my Mnzvgs Mazytszf Merqlsu ny hox moup Wa inqrg ipl. Ynr. Gotgat Gltzndtg Gplrfdo

Ltc tnj tmvqpmkseaznzn uk ehox nivmpr g ylbrj ts ltcmki my yqtdosr tnj wocjc hgqq ol fy oxitngwj arusahje fuw ln guaaxjytrd catizm tzxbkw zf vqlckx hizm ceyupcz yz tnj fpvjc hgqqpohzCZK{m311a50_0x_a1rn3x3_h1ah3x7g996649}

Ehk ktryy herq-ooizxetypd jjdcxnatoty ol f aordllvmlbkytc inahkw socjgex, bls sfoe gwzuti 1467 my Rjzn Hfetoxea Gqmexyt.

Tnj Gimjyèrk Htpnjc iy ysexjqoxj dosjeisjd cgqwej yse Gqmexyt Doxn ox Fwbkwei Inahkw.

Tn 1508, Ptsatsps Zwttnjxiax tnbjytki ehk xz-cgqwej ylbaql rkhea (g rltxni ol xsilypd gqahggpty) ysaz bzuri wazjc bk f nroytcgq nosuznkse ol yse Bnretèwp Cousex.

Gplrfdo’y xpcuso butvlky lpvjlrki tn 1555 gx l cuseitzltoty ol yse lncsz. Yse rthex mllbjd ol yse gqahggpty fce tth snnqtki cemzwaxqj, bay ehk fwpnfmezx lnj yse osoed qptzjcs gwp mocpd hd xegsd ol f xnkrznoh vee usrgxp, wnnnh ify bk itfljcety hizm paim noxwpsvtydkse.

Flag:

Tapping [200 pts]

Description

Theres tapping coming in from the wires. What's it saying nc jupiter.challenges.picoctf.org 21610.

Solution

Flag: PICOCTF{M0RS3C0D31SFUN3902019519}

Flags [200 pts] [Not Solved]

Description

Solution

a

Flag:

Mr-Worldwide [200 pts] [Not Solved]

Description

Solution

a

Flag:

rsa-pop-quiz [200 pts] [Not Solved]

Description

Class, take your seats! It's PRIME-time for a quiz... nc jupiter.challenges.picoctf.org 58617

Solution

a

Flag:

waves over lambda [300 pts] [Not Solved]

Description

We made a lot of substitutions to encrypt this. Can you decrypt it? Connect with nc jupiter.challenges.picoctf.org 43522.

Solution

a

Flag:

miniRSA [300 pts] [Not Solved]

Description

Solution

a

Flag:

b00tl3gRSA2 [400 pts] [Not Solved]

Description

In RSA d is a lot bigger than e, why don't we use d to encrypt instead of e? Connect with nc jupiter.challenges.picoctf.org 19566.

Solution

a

Flag:

AES-ABC [400 pts] [Not Solved]

Description

Solution

a

Flag:

b00tl3gRSA3 [450 pts] [Not Solved]

Description

Why use p and q when I can use more? Connect with nc jupiter.challenges.picoctf.org 4557.

Solution

a

Flag:

john_pollard [500 pts] [Not Solved]

Description

Solution

a

Flag:

Decrypt this .

Hmmm, let me just guess Morse code maybe. Connecting it gives an easy impression with .--. .. -.-. --- -.-. - ..-. { -- ----- .-. ... ...-- -.-. ----- -.. ...-- .---- ... ..-. ..- -. ...-- ----. ----- ..--- ----- .---- ----. ..... .---- ----. } Which put into comes out the flag. (Note to do this you have to remove the {})

What do the mean?

A musician left us a . What's it mean?

Let's decrypt this: ? Something seems a bit small.

AES-ECB is bad, so I rolled my own cipher block chaining mechanism - Addition Block Chaining! You can find the source here: . The AES-ABC flag is

Sometimes RSA are breakable

numbers
table
message
Cyber Chef
flags
message
ciphertext
aes-abc.py
body.enc.ppm
certificates