Crypto CTFs Tricks
Reading time: 6 minutes
tip
Leer & oefen AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Leer & oefen GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Ondersteun HackTricks
- Kyk na die subskripsie planne!
- Sluit aan by die π¬ Discord groep of die telegram groep of volg ons op Twitter π¦ @hacktricks_live.
- Deel hacking truuks deur PRs in te dien na die HackTricks en HackTricks Cloud github repos.
Aanlyn Hashes DBs
- Google dit
- http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240
- https://www.onlinehashcrack.com/
- https://crackstation.net/
- https://md5decrypt.net/
- https://www.onlinehashcrack.com
- https://gpuhash.me/
- https://hashes.org/search.php
- https://www.cmd5.org/
- https://hashkiller.co.uk/Cracker/MD5
- https://www.md5online.org/md5-decrypt.html
Magic Autosolvers
- https://github.com/Ciphey/Ciphey
- https://gchq.github.io/CyberChef/ (Magic module)
- https://github.com/dhondta/python-codext
- https://www.boxentriq.com/code-breaking
Encoders
Meeste van die geΓ«nkodeerde data kan met hierdie 2 hulpbronne gedecodeer word:
Substitution Autosolvers
Caesar - ROTx Autosolvers
Atbash Cipher
Base Encodings Autosolver
Kontroleer al hierdie basisse met: https://github.com/dhondta/python-codext
- Ascii85
BQ%]q@psCd@rH0l
- Base26 [A-Z]
BQEKGAHRJKHQMVZGKUXNT
- Base32 [A-Z2-7=]
NBXWYYLDMFZGCY3PNRQQ====
- Zbase32 [ybndrfg8ejkmcpqxot1uwisza345h769]
pbzsaamdcf3gna5xptoo====
- Base32 Geohash [0-9b-hjkmnp-z]
e1rqssc3d5t62svgejhh====
- Base32 Crockford [0-9A-HJKMNP-TV-Z]
D1QPRRB3C5S62RVFDHGG====
- Base32 Extended Hexadecimal [0-9A-V]
D1NMOOB3C5P62ORFDHGG====
- Base45 [0-9A-Z $%*+-./:]
59DPVDGPCVKEUPCPVD
- Base58 (bitcoin) [1-9A-HJ-NP-Za-km-z]
2yJiRg5BF9gmsU6AC
- Base58 (flickr) [1-9a-km-zA-HJ-NP-Z]
2YiHqF5bf9FLSt6ac
- Base58 (ripple) [rpshnaf39wBUDNEGHJKLM4PQ-T7V-Z2b-eCg65jkm8oFqi1tuvAxyz]
pyJ5RgnBE9gm17awU
- Base62 [0-9A-Za-z]
g2AextRZpBKRBzQ9
- Base64 [A-Za-z0-9+/=]
aG9sYWNhcmFjb2xh
- Base67 [A-Za-z0-9-.!~_]
NI9JKX0cSUdqhr!p
- Base85 (Ascii85) [!"#$%&'()*+,-./0-9:;<=>?@A-Z[\]^_`a-u]
BQ%]q@psCd@rH0l
- Base85 (Adobe) [!"#$%&'()*+,-./0-9:;<=>?@A-Z[\]^_`a-u]
<~BQ%]q@psCd@rH0l~>
- Base85 (IPv6 or RFC1924) [0-9A-Za-z!#$%&()*+-;<=>?@^`{|}~_]
Xm4y
V_|Y(V{dF>`- Base85 (xbtoa) [!"#$%&'()*+,-./0-9:;<=>?@A-Z[\]^_`a-u]
xbtoa Begin\nBQ%]q@psCd@rH0l\nxbtoa End N 12 c E 1a S 4e6 R 6991d
- Base85 (XML) [_0-9A-Za-y!#$()*+,-./:;=?@^`{|}~z__]
Xm4y|V{~Y+V}dF?
- Base91 [A-Za-z0-9!#$%&()*+,./:;<=>?@[]^_`{|}~"]
frDg[*jNN!7&BQM
- Base100 []
ππ¦π£ππππ©πππ¦π£π
- Base122 []
4F Λr0Xmvc
- ATOM-128 [/128GhIoPQROSTeUbADfgHijKLM+n0pFWXY456xyzB7=39VaqrstJklmNuZvwcdEC]
MIc3KiXa+Ihz+lrXMIc3KbCC
- HAZZ15 [HNO4klm6ij9n+J2hyf0gzA8uvwDEq3X1Q7ZKeFrWcVTts/MRGYbdxSo=ILaUpPBC5]
DmPsv8J7qrlKEoY7
- MEGAN35 [3G-Ub=c-pW-Z/12+406-9Vaq-zA-F5]
kLD8iwKsigSalLJ5
- ZONG22 [ZKj9n+yf0wDVX1s/5YbdxSo=ILaUpPBCHg8uvNO4klm6iJGhQ7eFrWczAMEq3RTt2]
ayRiIo1gpO+uUc7g
- ESAB46 []
3sHcL2NR8WrT7mhR
- MEGAN45 []
kLD8igSXm2KZlwrX
- TIGO3FX []
7AP9mIzdmltYmIP9mWXX
- TRIPO5 []
UE9vSbnBW6psVzxB
- FERON74 []
PbGkNudxCzaKBm0x
- GILA7 []
D+nkv8C1qIKMErY1
- Citrix CTX1 []
MNGIKCAHMOGLKPAKMMGJKNAINPHKLOBLNNHILCBHNOHLLPBK
http://k4.cba.pl/dw/crypo/tools/eng_atom128c.html - 404 Dood: https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng_hackerize.html
HackerizeXS [β«Ξβ»ββ°β]
β«ββΞβ»ΞβΞβ»ββΞ
- http://k4.cba.pl/dw/crypo/tools/eng_hackerize.html - 404 Dood: https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng_hackerize.html
Morse
.... --- .-.. -.-. .- .-. .- -.-. --- .-.. .-
UUencoder
begin 644 webutils_pl
M2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(
M3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/
F3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$$`
`
end
XXEncoder
begin 644 webutils_pl
hG2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236
5Hol-G2xAEE++
end
YEncoder
=ybegin line=128 size=28 name=webutils_pl
ryvkryvkryvkryvkryvkryvkryvk
=yend size=28 crc32=35834c86
BinHex
(This file must be converted with BinHex 4.0)
:#hGPBR9dD@acAh"X!$mr2cmr2cmr!!!!!!!8!!!!!-ka5%p-38K26%&)6da"5%p
-38K26%'d9J!!:
ASCII85
<~85DoF85DoF85DoF85DoF85DoF85DoF~>
Dvorak sleutelbord
drnajapajrna
A1Z26
Letters na hul numeriese waarde
8 15 12 1 3 1 18 1 3 15 12 1
Affine Cipher Encode
Letter na nommer (ax+b)%26
(a en b is die sleutels en x is die letter) en die resultaat terug na letter
krodfdudfrod
SMS Kode
Multitap vervang 'n letter deur herhaalde syfers gedefinieer deur die ooreenstemmende sleutelkode op 'n mobiele foon sleutelbord (Hierdie modus word gebruik wanneer SMS geskryf word).
Byvoorbeeld: 2=A, 22=B, 222=C, 3=D...
Jy kan hierdie kode identifiseer omdat jy** verskeie syfers herhaal** sal sien.
Jy kan hierdie kode dekodeer in: https://www.dcode.fr/multitap-abc-cipher
Bacon Kode
Vervang elke letter met 4 A's of B's (of 1's en 0's)
00111 01101 01010 00000 00010 00000 10000 00000 00010 01101 01010 00000
AABBB ABBAB ABABA AAAAA AAABA AAAAA BAAAA AAAAA AAABA ABBAB ABABA AAAAA
Runes
Kompressie
Raw Deflate en Raw Inflate (jy kan albei in Cyberchef vind) kan data saamgepers en ontspan sonder koptekste.
Maklike Crypto
XOR - Autosolver
Bifid
'n Sleutelwoord is nodig
fgaargaamnlunesuneoa
Vigenere
'n Sleutelwoord is nodig
wodsyoidrods
- https://www.guballa.de/vigenere-solver
- https://www.dcode.fr/vigenere-cipher
- https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx
Sterk Crypto
Fernet
2 base64 strings (token en sleutel)
Token:
gAAAAABWC9P7-9RsxTz_dwxh9-O2VUB7Ih8UCQL1_Zk4suxnkCvb26Ie4i8HSUJ4caHZuiNtjLl3qfmCv_fS3_VpjL7HxCz7_Q==
Key:
-s6eI5hyNh8liH7Gq0urPC-vzPgNnxauKvRO4g03oYI=
Samir Geheime Deel
'n Geheim word in X dele verdeel en om dit te herstel, het jy Y dele nodig (Y <=X).
8019f8fa5879aa3e07858d08308dc1a8b45
80223035713295bddf0b0bd1b10a5340b89
803bc8cf294b3f83d88e86d9818792e80cd
http://christian.gen.co/secrets/
OpenSSL brute-force
Gereedskap
- https://github.com/Ganapati/RsaCtfTool
- https://github.com/lockedbyte/cryptovenom
- https://github.com/nccgroup/featherduster
tip
Leer & oefen AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Leer & oefen GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Ondersteun HackTricks
- Kyk na die subskripsie planne!
- Sluit aan by die π¬ Discord groep of die telegram groep of volg ons op Twitter π¦ @hacktricks_live.
- Deel hacking truuks deur PRs in te dien na die HackTricks en HackTricks Cloud github repos.