aes

CONFidence CTF 2019 Teaser|Count me in!

#CONFidenceCTF2019Teaser https://ctftime.org/task/7838 中には count.py と output.txtがある import multiprocessing from Crypto.Cipher import AES from secret import key, flag counter = 0 aes = AES.new(key, AES.MODE_ECB) def chunk(input_data,…

N1CTF 2021 | n1ogin

#n1ctf2021 このほか n1ogin.pub の他、adminがログインしたときのpcapファイルが渡されている import os import json import time from Crypto.PublicKey.RSA import import_key from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, m…

ångstromCTF 2019 | Secret Sheep Society

#angstromCTF2019 https://ctftime.org/task/8341 Bit Flipping Attack on AES https://furutsuki.hatenablog.com/entry/2019/04/25/143959#Crypto-120ptsSecret-Sheep-Society

Pwn2Win 2020 | Android Encryption

aes

AES https://furutsuki.hatenablog.com/entry/2020/06/01/023111#crypto-Androids-Encryption

HackIM 2020 | ayyMessage

#AES #CTRモード #!/usr/bin/env python3 from Crypto.PublicKey import RSA, ECC import json from hashlib import sha256 from Crypto.Cipher import AES, PKCS1_OAEP from base64 import b64decode from Crypto.Signature import DSS from Crypto.Hash im…

Crypto CTF 2021 | Wolf

#cryptoctf2021 #!/usr/bin/env python3 from Cryptodome.Cipher import AES import os import time import sys import random from flag import flag passphrase = b'HungryTimberWolf' def encrypt(msg, passphrase, niv): msg_header = 'EPOCH:' + str(in…

RaRCTF 2021 | mini-a3s

#rarctf2021 ''' Base-3 AES Just use SAGE lmao ''' T_SIZE = 3 # Fixed trits in a tryte W_SIZE = 3 # Fixed trytes in a word (determines size of matrix) POLY = (2, 0, 1, 1) # Len = T_SIZE + 1 POLY2 = ((2, 0, 1), (1, 2, 0), (0, 2, 1), (2, 0, 1…

Google CTF 2021 | Pythia

#googlectf2021 #!/usr/bin/python -u import random import string import time from base64 import b64encode, b64decode from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives.ciphers.aead import AESGCM fro…

CSA Capture The Flag 2019 | Flag Server

#CSACTF2019 https://ctftime.org/task/8470 import sys, time from Crypto.Hash import SHA256 from Crypto.Cipher.AES import AESCipher flag = "Flag goes here" def encrypt(m): key = SHA256.new(flag).digest() try: text = 'rowdy123' + m.decode('ba…

pwn2win 2021 | cladorhizidae

#pwn2win2021 #AES cladorhizidae_50bb826634ab0a20be92c226ae21f530b59818923e3920b5aa4b1a17cae0d69e.tar.gz

pwn2win 2021 | A2S

#pwn2win2021 #AES #differential_cryptoanalysis a2s_696ce43f930ebc1f53f413a7ef972d34155748dacc7a8ca8cdeeab7a50b7f12d.tar.gz

RaRCTF 2021 | a3s

#rarctf2021 #good_challenges_2021 ''' Base-3 AES Just use SAGE lmao ''' T_SIZE = 3 # Fixed trits in a tryte W_SIZE = 3 # Fixed trytes in a word (determines size of matrix) POLY = (2, 0, 1, 1) # Len = T_SIZE + 1 POLY2 = ((2, 0, 1), (1, 2, 0…

zer0pts CTF 2021 | 3-AES

#zer0ptsCTF2021 from Crypto.Cipher import AES from Crypto.Random import get_random_bytes from binascii import hexlify, unhexlify from hashlib import md5 import os import signal from flag import flag keys = [md5(os.urandom(3)).digest() for …

DownUnderCTF 2020 | Exra Cool Block Chaining

#!/usr/bin/env python3 from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad from Crypto.Util.strxor import strxor from os import urandom flag = open('./flag.txt', 'rb').read().strip() KEY = urandom(16) IV = urandom(16) …