In this challenge we get a Windows XP memory dump and we are told to get the password inside a KeePassX file. KeePassX stores critical key encrypted in memory following a memory dump attack described here: http://systemoverlord.com/sites/default/files/projects/KeePassX.pdf But it’s still possible to dump keys with the current version. Please see Hugo […]
Tag: Crypto
PlaidCTF 2012 – Password Guessing 300 – Encryption Service Writeup
We found the source code for this robot encryption service, except the key was redacted from it. The service is currently running at 23.21.15.166:4433 #!/usr/bin/python import os import struct import SocketServer from Crypto.Cipher import AES ENCRYPT_KEY = ‘xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx’.decode(’hex’) # Character set: lowercase letters and underscore PROBLEM_KEY = ‘xxxxxxxxxxxxxxxxxxxxxxxxxxxxx’ BLOCK_SIZE = […]
Insomni’hack 2012 Network PCAP Write-ups
In this challenge we 2 files: 1 PCAP, 1 Python The PCAP file contains a dialog between a client and server that goes like this: > = client to server < = server to client > 8e67bb26b358e2ed20fe552ed6fb832f397a507d:3daf723376f823eceeb314c8fa60e47b1ba23633 < 5f367ff47fff772986cca54219fa167175353dc7 > 78be5fe51f264a4067463bad57022348 < 3290452b9a9f6d18523347dd1daa54a1e09195a7 > 94817a6b1d833e1ffb4fcb2aa7dd14143dc5759e>_