Merge branch 'master' of github.com:failedxyz/easyctf

This commit is contained in:
Jacob Magnuson 2017-03-15 02:28:21 +00:00
commit f2af41ecb1
15 changed files with 2030 additions and 2015 deletions

View file

@ -1 +0,0 @@
I just intercepted some more odd [messages.txt](${messages_txt}). It appears to be a Diffie-hellman protocol, but my math isn't good enough to figure out what the final shared key is. Help! (The answer is a number. There is no easyctf{})

View file

@ -1,4 +0,0 @@
def grade(autogen, answer):
if answer == ("906730649345"):
return True, "Correct!"
return False, "Nope, try again."

View file

@ -1,4 +0,0 @@
g^a mod p = 791868216278
g^b mod p = 722955066776
p = 986314922069

File diff suppressed because it is too large Load diff

View file

@ -1,4 +1,4 @@
def grade(autogen, key):
if key.find("fe18ebaf381a63b3bf6a76cadcaaeb6e") != -1:
if key.find("51cacb0258b7862d646964c0da7c6125") != -1:
return True, "Correct!"
return False, "Nope!"

File diff suppressed because it is too large Load diff

View file

@ -1,6 +1,6 @@
author: GenericNickname
title: Match Me
hint: This is a fairly well-known graph problem. There is probably some sort of internet source on it.
hint: This is a fairly well-known graph problem. I would guess there is some sort of internet source on it.
category: Programming
autogen: false
programming: false

1
rsa4/description.md Normal file
View file

@ -0,0 +1 @@
After doing so much RSA, I finally messed up.... pls help. I encrypted my secret [message]($rsa4) but the decryption isn't working!!

4
rsa4/grader.py Normal file
View file

@ -0,0 +1,4 @@
def grade(autogen, key):
if key.find("m0dul4r_fuN!") != -1:
return True, "Thanks!"
return False, "Nope. You've failed me :("

View file

@ -1,8 +1,9 @@
title: Diffie-culter
author: arxenix
title: RSA 4
hint: Why won't it decrypt?
category: Cryptography
autogen: false
programming: false
value: 140
value: 200
files:
- messages.txt
- rsa4

6
rsa4/rsa4 Normal file
View file

@ -0,0 +1,6 @@
p= 13013195056445077675245767987987229724588379930923318266833492046660374216223334270611792324721132438307229159984813414250922197169316235737830919431103659
q= 12930920340230371085700418586571062330546634389230084495106445639925420450591673769061692508272948388121114376587634872733055494744188467315949429674451947
e= 100
C= 2536072596735405513004321180336671392201446145691544525658443473848104743281278364580324721238865873217702884067306856569406059869172045956521348858084998514527555980415205217073019437355422966248344183944699168548887273804385919216488597207667402462509907219285121314528666853710860436030055903562805252516

View file

@ -1,4 +1,4 @@
def grade(autogen, key):
if key.find("it's_2017_who_still_uses_php?(jk_82.5%_of_websites)") != -1:
if key.find("it's_2017_anD_we're_still_using_PHP???") != -1:
return True, "You got it!"
return False, "Nope. Keep poking around."

View file

@ -0,0 +1 @@
I was just going to search some random cat videos on a Saturday morning when my friend came up to me and told me to reach the end of this [tunnel](http://tunnel.web.easyctf.com). Can you do it for me?

4
web-tunnel/grader.py Normal file
View file

@ -0,0 +1,4 @@
def grade(autogen, key):
if key.find("y0u_sh0uld_b3_t1r3d_tr4v3ll1ng_all_th1s_w4y") != -1:
return True, "Nice job! Your journey was fruitful!"
return False, "Nope. Dig deeper."

7
web-tunnel/problem.yml Normal file
View file

@ -0,0 +1,7 @@
title: Web Tunnel
author: dududum561
hint: You should write a script for this. The tunnel goes on too deep for any normal human.
category: Web
autogen: false
programming: false
value: 260