Skip to content

Latest commit

 

History

History

RedPwnCTF'20

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

So back again with some writeups as there were not many good challenges in ctfs in past few months. I loved some of the challenges of this CTF, while the category wise challenges were good.

Link to the challenges

alien-transmissions-v2 -:

description:

The aliens are at it again! We've discovered that their communications are in base 512 and have transcribed them in base 10. However, it seems like they used XOR encryption twice with two different keys! We do have some information:

  1. This alien language consists of words delimitated by the character represented as 481
  2. The two keys appear to be of length 21 and 19
  3. The value of each character in these keys does not exceed 255 Find these two keys for me; concatenate their ASCII encodings and wrap it in the flag format.

challenge file : encrypted.txt

77 solves | 481 points

Solution:

NOTE: There was a change in challenge statement that key's length does not exceed 128 as it was readable.

Tl;dr : This challenge looked impossible to solve once as how can I predict where will '481' occur in the encrypted text so after lot of approaches I finally reach to this one.

So challenge statement was clear that there is a bunch of xor encrypted base512 characters represented in base10. And there is fixed key1 and key2 because it is part of our flag. That means

cyclic(key1) ^ cyclic(key2) ^ original_message = given_ciphertext

Let the cryptanalysis begin. We know that the given_ciphertext and we know key1 & key2 but original_message is completely random so there is no way we can get the keys , as for any possible set of keys there can be a valid original message.

But there was this catch that make this challenge easier that the alien messages are separated by 481. So think of it like there are bunch of words having length [2-20] consisting of base512 characters delimited by 481. Then 481 will occur the most than other possible characters in original message.

Based on that we can just divide the data into chunks of lcm(19,21) Reason: as we will have key1[i%21]^key2[i%19] be same and obtain the most occured element in each row to be 481.

Let's check the counter first to be sure

from collections import Counter
import string

f= open("encrypted.txt","r").read().split("\n")
lim = 21*19
lis = [[] for i in range(lim)]

for ind in range(len(f)):
	el = f[ind]
	lis[ind%(lim)].append(el)

cols = []
for row in lis:
	x = Counter(row)
	print(x)

Output:

Counter({'470': 250, '78': 12, '74': 12, '485': 11, '31': 11, '91': 11, '267': 11, '328': 10, .......
Counter({'422': 246, '182': 12, '331': 11, '407': 10, '381': 10, '446': 10, '15': 10, '17': 10, .....
.....

So it was obvious now. Then we have key1[i]^key2[j]^(most_common^481) to be the original message and we have lcm(19,21) equations, so we can just easily pick one index and get the other chars easily.

Here is our final script:

from collections import Counter
import string

f= open("encrypted.txt","r").read().split("\n")
lim = 21*19
lis = [[] for i in range(lim)]

for ind in range(len(f)):
	el = f[ind]
	lis[ind%(lim)].append(el)

cols = []
for row in lis:
	x = Counter(row)
	cols.append(x.most_common(1)[0][0])

for i in range(lim):
	cols[i] = int(cols[i]) ^ 481

key1 = ["*" for i in range(21)]
key2 = ["*" for i in range(19)]

for i in range(128): # checking for only readable characters
	key1[0] = chr(i)
	for j in range(19):
		key2[(21*j)%19] = chr(cols[21*j]^i)
	k2 = "".join(key2)
	if k2.isprintable():
		for m in range(21):
			key1[m%21] = chr(ord(k2[m%19])^cols[m])
		k1 = "".join(key1)
		if k1.isprintable():
			print("probable flag : flag{"+k1+k2+"}")

We got this output here

Flag : flag{h3r3'5_th3_f1r5t_h4lf_th3_53c0nd_15_th15}

itsy-bitsy-:

description:

The itsy-bitsy spider climbed up the water spout...

nc 2020.redpwnc.tf 31284

challenge file : itsy-bitsy.py

216 solves | 436 points

Solution:

If we look into the script

#!/usr/bin/env python3

from Crypto.Random.random import randint

def str_to_bits(s):
    bit_str = ''
    for c in s:
        i = ord(c)
        bit_str += bin(i)[2:]
    return bit_str

def recv_input():
    i = input('Enter an integer i such that i > 0: ')
    j = input('Enter an integer j such that j > i > 0: ')
    try:
        i = int(i)
        j = int(j)
        if i <= 0 or j <= i:
            raise Exception
    except:
        print('Error! You must adhere to the restrictions!')
        exit()
    return i,j

def generate_random_bits(lower_bound, upper_bound, number_of_bits):
    bit_str = ''
    while len(bit_str) < number_of_bits:
        r = randint(lower_bound, upper_bound)
        bit_str += bin(r)[2:]
    return bit_str[:number_of_bits]

def bit_str_xor(bit_str_1, bit_str_2):
    xor_res = ''
    for i in range(len(bit_str_1)):
        bit_1 = bit_str_1[i]
        bit_2 = bit_str_2[i]
        xor_res += str(int(bit_1) ^ int(bit_2))
    return xor_res

def main():
    with open('flag.txt','r') as f:
        flag = f.read()
    for c in flag:
        i = ord(c)
        assert i in range(2**6,2**7)
    flag_bits = str_to_bits(flag)
    i,j = recv_input()
    lb = 2**i
    ub = 2**j - 1
    n = len(flag_bits)
    random_bits = generate_random_bits(lb,ub,n)
    encrypted_bits = bit_str_xor(flag_bits,random_bits)
    print(f'Ciphertext: {encrypted_bits}')

if __name__ == '__main__':
    main()

So if we connect to server and chose any valid i and j we will get a string of bits with length of 301.When we look to the str_to_bits function it will give you 7 bits for each character as readable range is upto 127.

And 301/7 = 43 i.e. length of our flag.

On looking into generate_random_bits() it will create a random bit string. So we need to somehow control particular bit to decrypt the encrypted bit. If I send i=3 & j=4 so the data range will be from 1000 to 1111 where we know that every 4*x+1 th bit is 1 always. So if I send {a-1,a} as valid {i,j} where a is any integer then I can reveal every xth bit.

I used primes for effective results. So here's the final script:

#!/usr/bin/python3

from pwn import *
from Crypto.Util.number import isPrime
flag = ["*" for i in range(301)]

for i in range(2,302):
	if not isPrime(i):
		continue
	r = remote("2020.redpwnc.tf", 31284)
	r.recv()
	r.sendline(str(i-1))
	r.recv()
	r.sendline(str(i))
	xored = r.recv().split()[-1]
	for j in range(0,301,i):
		val = str((xored[j]-ord('0')) ^ 1) # Bit-Flipping
		if flag[j] == "*":
			flag[j] = val
		else:
			try:
				assert( val == flag[j])
			except:
				print("Logical Error")  # To check the integrity of the algorithm
				exit()
	cur_flag = "".join(flag).replace("*","1")
	Current_flag = ""
	for part in range(0,len(cur_flag),7):
		Current_flag+=chr(int(cur_flag[part:part+7],2))
	print(f"Flag after {i} operations:{Current_flag}")
	r.close()

Flag: flag{bits_leaking_out_down_the_water_spout}