Skip to content

Latest commit

 

History

History
76 lines (53 loc) · 1.83 KB

Writeup.md

File metadata and controls

76 lines (53 loc) · 1.83 KB

PW Crack 1

PW Crack 1

| 100 points

Tags: Category: General Skillspassword_cracking

AUTHOR: LT 'SYREAL' JONES

Description

Can you crack the password to get the flag?Download the password checker here and you'll need the encrypted flag in the same directory too.

here

flag


Encrypted Flag

PW&m#CPPP:KTV_:ZZX[D

level1.flag.txt.enc

PW Checker

### THIS FUNCTION WILL NOT HELP YOU FIND THE FLAG --LT ########################
def str_xor(secret, key):
    #extend key to secret length
    new_key = key
    i = 0
    while len(new_key) < len(secret):
        new_key = new_key + key[i]
        i = (i + 1) % len(key)        
    return "".join([chr(ord(secret_c) ^ ord(new_key_c)) for (secret_c,new_key_c) in zip(secret,new_key)])
###############################################################################

flag_enc = open('level1.flag.txt.enc', 'rb').read()

def level_1_pw_check():
    user_pw = input("Please enter correct password for flag: ")
    if( user_pw == "e9e8"):
        print("Welcome back... your flag, user:")
        decryption = str_xor(flag_enc.decode(), user_pw)
        print(decryption)
        return
    print("That password is incorrect")

level_1_pw_check()

In line 19 we can find a if statement

if( user_pw == "e9e8"):

By Entering it as the flag we can obtain the flag easily

$ python3 level1.py 
Please enter correct password for flag: e9e8
Welcome back... your flag, user:
picoCTF{545h_r1ng1ng_ccbfafcb}

FLAG

picoCTF{545h_r1ng1ng_ccbfafcb}