code hacking, zen coding

HackYouToo CTF – Crypto 300 – Everybody Lies

HackYouToo CTF – Crypto 300 – Everybody Lies

Mr. Menhall has invented his own encryption algorithm and promised to give the flag to anyone who manages to decipher the message: vWsMajX21l6BdKwDxaRA3utqhpvFL0V= def hashcrypt(msg, key):     token = hashlib.sha1(key).digest()     res = ""     for c in msg:         n = ord(c) ^ […]

Share

HackYouToo CTF – Crypto 500 – AllahAkbar

HackYouToo CTF – Crypto 500 – AllahAkbar

We were able to intercept a suspicious file. This is an archive of correspondence between leading cryptographers of hostile organization. According to the agents’ data, during the conversation one of the respondents accidentally uses a file that is added as trusted to all computers of the organization. Their antivirus software […]

Share

HackYouToo CTF – Binary 300 – Shredder Write-up

HackYouToo CTF – Binary 300 – Shredder Write-up

Have you tried feeding critical documents to a shredder? We’ve accidentally done this very thing. Shredder: shredder.exe Document remains: broken_flag.jpg We need our document back! See: http://hackyou.ctf.su/tasks/shredder Shredder is a Win32 binary that encrypt source file “flag.jpg” to “broken_flag.jpg”. The encryption is only some translations and swaps and can be […]

Share