MCTEENX

Description

By Mcsky23

I fly in the sky, I got wings on my feet.

Downloads: red.ziparrow-up-right

Solution

After downloading the zip, we are unable to extract due to password.

Since I used 7zip I saw something interesting

mcteenx-1

Googling ZipCrypto Store got me directly to exploits.

I followed this post https://www.anter.dev/posts/plaintext-attack-zipcrypto/arrow-up-right to get the file from zip.

Yes, my CPU almost died. Lul

script.sh produces image. echo '<ReallyLongBase64String> | base64 -d > red.png

Since we are most likely dealing with Steganography let's try steganography tools.

strings and exiftool came empty handed. Since it's PNG steghide or such tools won't work. But what about zstegarrow-up-right?

0w0 Really long hex string?

Unfortunately decoding from hex to ascii doesnt give us flag.

I had encountered similar challenge on SecurityValleyarrow-up-right. By similar I mean decoding hex. If it's cryptographically "secured" let's try XOR, in this case XOR with Crib (plaintext) attack.

Since XOR is symetical encryption we need to find key. To find key we try to use Crib Drag attack, where we compare portion of encoded flag to known flag.

I started cooking in CyberChef:

mcteenx-2
mcteenx-3
mcteenx-4

Key = 574c: TF Key = 5257: CC Key = 4c52: TF

Full Key: 574c52574c52 XOR Key: 574c52

Since key got repeated we know for sure that 574c52 is the key.

mcteenx-5
circle-check

Last updated