Nowruz-1404
Nowruz 1404Nowruz 1404 is an online jeopardy-style Capture The Flag competition organized by the FlagMotori team.I played this ctf under RE:UN10N team and got 10th place. This writeup will cover the crypto challenges only. CryptoBrutal RSAQuestion: Sometimes you need to be cruel to be able to solve a crypto challenge, don’t you? Wrap the decrypted message in: FMCTF{} output.txt: 123c = ...
ApoorvCTF
We played ApoorvCTF Cryptokowareta cipherTHe question is about AES-ECB Plaintext Recovery. It is a cryptographic attack that exploits the weaknesses of the ECB mode. In ECB mode, identical plaintext blocks are encrypted into identical ciphertext blocks, making it vulnerable to pattern recognition and chosen-plaintext attacks. Chall.py12345678910111213141516171819202122232425262728293031323334353637import sysfrom Crypto.Cipher import AESfrom Crypto.Util.Padding import padfrom random import...
WargamesMY 2024
WargamesMY 2024Writeup for the challenges that I solved in Wargames.MY 2024This is my first time participating in WMGY and we solved some solvable challenges. MiscChristmas GIFtHere is your christmas GIFt from santa! Just open and wait for it.. SolutionThe solution is really like the description, Just open and wait for it..Opened it in stegsolve and the flag is on frame 1402 DCM Meta“[25, 10, 0, 3, 17, 19, 23, 27, 4, 13, 20, 8, 24, 21, 31, 15, 7, 29, 6, 1, 9, 30, 22, 5, 28, 18, 26, 11, 2,...
CryptoHack
RSARSA Signature The private keys are 12N =...




