[bugs_bunny ctf 2k17] Crypto Write-Ups | Ph03nix Team

Ph03nix Team

H4ck f0r fun

Home About Us
[bugs_bunny ctf 2k17] Crypto Write-Ups
BlackWings

Sorry everyone, because when this CTF event running, i busy. Now i’m free and solved some challenges.

Crypto-15



This is Shift Cipher, you can use this tool or write some lines of code to solve crypto-15.py

[*] Decrypted text: Bugs_Bunny{C35aR_3NC0D3_4R3_N0T_S3CuR3_AT_4LL}

Rot : 25



Crypto-20



Do you know brainfuk languague? Use this tool to decode

FLAG: Bugs_Bunny{Br41N_Fu**}



Crypto-25

Question: crypto-25

Another eazy challenges 😋😋😋 just open this file with notepad, this is Ook language. Decode with this tool

FLAG: Bugs_Bunny{Ju5T_OoK!}



Scy way


Question name told me everything Scy ==> Scytale Cipher
Solved with this tool
FLAG: Bugs_Bunny{ISHOULDLEARNMORECIPHER}


Crypto-50

Question: enc-crypto-50.txt
Hmm, this is base64 encode but when i decode result is another base64 encode. I know flag have ‘Bugs_Bunny’ so solved with some lines of code ✊✊✊ crypto-50.py

FLAG: Bugs_Bunny{N0T_H4Rd_4T_4ll}



Baby RSA



This is basic RSA, use FactorDB to find p, q
http://factordb.com/index.php?query=20473673450356553867543177537

P = 2165121523231
Q = 9456131321351327
phi = ( P - 1) * ( Q - 1)
==> D ==> Decrypted message
Baby-RSA.py

FLAG: Bugs_Bunny{Baby_RSA_Its_Cool_Lik3_school_haHAha}



RSA2

Question: RSA2.txt


FactorDB cannot find P, Q so we need to use another algorithm to find P, Q. I use Wiener’s attack to find P, Q
https://github.com/rk700/attackrsa

attackrsa -t wiener -n N -e E

FLAG: Bugs_Bunny{Baby_Its_Cool_Lik3_school_haHAha}