Beginner

Еmptiness

Description

Click herearrow-up-right

Solution

If we visit website it's blank.

Source Code:

<!DOCTYPE html>
<html lang="en">
  <head>
    <meta charset="UTF-8" />
    <meta http-equiv="X-UA-Compatible" content="IE=edge" />
    <meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <title>Javascript - Source</title>

    <script>
      function login() {
        key = prompt('secret key');
        if ( key == grodno{d21940vMGFf2Ug84gN3ndqdf186d} {
          alert('You have entered the correct secret key.')
        }
        else {
          alert('Errror');
        }
      }
    </script>
  </head>
  <body onload="login()"></body>
</html>
circle-check

Crashme

Description

Can you break the program?

nc ctf.mf.grsu.by 9024

Solution

Challenge seems to have been simple buffer overflow, entering bunch of A-s overflowed into different memery region and overwriten some check variable which gave us flag.

circle-check

Belarussian cipher

Description

“Кропка” is a “dot”, “працяжнiк” is a “dash”. The rest is up to you

bel_cipher.txtarrow-up-right

Solution

The description seems to be hinting towards Morse Codearrow-up-right, but for morse to get translated spaces need to be normizlied. Instead I tried binary approach:Кропка -> 1, працяжнiк -> 0

belarusian-cipher-1
circle-check

nanoRSA

Description

Where can I get a nanocomputer...

rsa.txtarrow-up-right

Solution

Plain RSA:

circle-info

or you can just calculate m = c % n because e is the smallest value it can be.

circle-check

Broken file

Description

Is there something wrong with the image?

image.jpgarrow-up-right

Solution

The given "jpg" seems to be a zip file, the flag is already visible so no need to unzip.

circle-check

As a programmer ...

Description

This is not only true for programmers - “every program has at least one error.”

In encryption, the picture is the same... I chose the wrong parameter, used the key incorrectly. And your secrets are no longer secrets.

output_RSA.txtarrow-up-right

code_RSA.pyarrow-up-right

chevron-rightoutput_RSA.txt Sourcehashtag
chevron-rightcode_RSA.py Sourcehashtag

check function seems to be doing nothing, I changed source code to print p, q, n:

Using the following values I pluged them in classis rsa decrypt script:

circle-check

I can do it in Chinese

Description

My friend has a crush on Chinese. I sent it, I don’t understand what...

杲潤湯等晟祯畟湥敤彩瑟楮彃桩湥獥彷敟捡湟摯彩瑟楮彃桩湥獥彽

in_Chinese.txtarrow-up-right

Solution

circle-check

Two points again

Description

I received a file with huge numbers. Explicitly RSA

output_badRSA1.txtarrow-up-right

He_chose_the_wrong_parameters_for_RSA.jpgarrow-up-right

chevron-rightoutput_badRSA1.txt Sourcehashtag

Solution

Idk why jpg was provided tbh... Anyway I was about to blast the RSA with rsactftool:

[!] Your provided modulus is prime: 👀 Why is RSA easily cracked if N is prime?arrow-up-right

Basically if N is prime then phi is N-1 instead of (p-1)*(q-1)

Plug the values again and solve:

circle-check

The Ripper

Description

The archive is one of the most secure places on my computer, unless the password is qwerty of course :)

Fortunately, I always use a random set of nine digits, oops... I shouldn’t have said that.

super-secret-files.ziparrow-up-right

Solution

Generate possible pins:

Unzip with 7zip (unzip didnt work?...):

Find flag:

circle-check

Last updated