padding_oracle_attack

Integral Communication | IrisCTF2024

#IrisCTF2024 from json import JSONDecodeError, loads, dumps from binascii import hexlify, unhexlify from Crypto.Cipher import AES from Crypto.Random import get_random_bytes with open("flag") as f: flag = f.readline() key = get_random_bytes…

N1CTF 2021 | n1ogin

#n1ctf2021 このほか n1ogin.pub の他、adminがログインしたときのpcapファイルが渡されている import os import json import time from Crypto.PublicKey.RSA import import_key from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, m…

BSidesSF 2019 CTF|decrypto

#BSidesSF2019CTF https://ctftime.org/task/7764 (decrypto's signature cookie is important.. the text at the top is wrong. Sorry!) Hack the mainframe! Location - https://decrypto-6213399b.challenges.bsidessf.net Web +Crypto。幸いにも問題情報…

SECCON CTF | cerberus

#seccon2021 #kurenaif import base64 from Crypto.Cipher import AES from Crypto.Random import get_random_bytes from Crypto.Util.Padding import pad, unpad from Crypto.Util.strxor import strxor from flag import flag import signal key = get_ran…

corCTF 2021 | babypad

#corctf2021 from Crypto.Cipher import AES from Crypto.Util import Counter from Crypto.Util.Padding import pad, unpad from Crypto.Util.number import bytes_to_long import os flag = open("/challenge/flag.txt").read().encode() key = os.urandom…

ACSC 2021 | CBCB

#acsc2021 #!/usr/bin/env python3 import base64 import json import os from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad from flag import flag key = os.urandom(16) iv1 = os.urandom(16) iv2 = os.urandom(16) admin_userna…

TG:HACK 2019 |Flippin' Awesome

#TG:HACK2019 We made a really awesome site, please check it out: https://awesome.tghack.no. Here's the source code if you want to take a look: server.py #!/usr/bin/env python2 from flask import Flask, render_template, request, url_for, red…

SECCON CTF 2022 Quals | Witche's symmetric exam

#SECCON_CTF_2022_Quals #kurenaif from Crypto.Cipher import AES from Crypto.Random import get_random_bytes from Crypto.Util.Padding import pad, unpad from flag import flag, secret_spell key = get_random_bytes(16) nonce = get_random_bytes(16…