Merge branch 'master' of github.com:failedxyz/easyctf
This commit is contained in:
commit
f2af41ecb1
15 changed files with 2030 additions and 2015 deletions
|
@ -1 +0,0 @@
|
|||
I just intercepted some more odd [messages.txt](${messages_txt}). It appears to be a Diffie-hellman protocol, but my math isn't good enough to figure out what the final shared key is. Help! (The answer is a number. There is no easyctf{})
|
|
@ -1,4 +0,0 @@
|
|||
def grade(autogen, answer):
|
||||
if answer == ("906730649345"):
|
||||
return True, "Correct!"
|
||||
return False, "Nope, try again."
|
|
@ -1,4 +0,0 @@
|
|||
g^a mod p = 791868216278
|
||||
g^b mod p = 722955066776
|
||||
|
||||
p = 986314922069
|
File diff suppressed because it is too large
Load diff
|
@ -1,4 +1,4 @@
|
|||
def grade(autogen, key):
|
||||
if key.find("fe18ebaf381a63b3bf6a76cadcaaeb6e") != -1:
|
||||
if key.find("51cacb0258b7862d646964c0da7c6125") != -1:
|
||||
return True, "Correct!"
|
||||
return False, "Nope!"
|
||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -1,6 +1,6 @@
|
|||
author: GenericNickname
|
||||
title: Match Me
|
||||
hint: This is a fairly well-known graph problem. There is probably some sort of internet source on it.
|
||||
hint: This is a fairly well-known graph problem. I would guess there is some sort of internet source on it.
|
||||
category: Programming
|
||||
autogen: false
|
||||
programming: false
|
||||
|
|
1
rsa4/description.md
Normal file
1
rsa4/description.md
Normal file
|
@ -0,0 +1 @@
|
|||
After doing so much RSA, I finally messed up.... pls help. I encrypted my secret [message]($rsa4) but the decryption isn't working!!
|
4
rsa4/grader.py
Normal file
4
rsa4/grader.py
Normal file
|
@ -0,0 +1,4 @@
|
|||
def grade(autogen, key):
|
||||
if key.find("m0dul4r_fuN!") != -1:
|
||||
return True, "Thanks!"
|
||||
return False, "Nope. You've failed me :("
|
|
@ -1,8 +1,9 @@
|
|||
title: Diffie-culter
|
||||
author: arxenix
|
||||
title: RSA 4
|
||||
hint: Why won't it decrypt?
|
||||
category: Cryptography
|
||||
autogen: false
|
||||
programming: false
|
||||
value: 140
|
||||
value: 200
|
||||
files:
|
||||
- messages.txt
|
||||
- rsa4
|
6
rsa4/rsa4
Normal file
6
rsa4/rsa4
Normal file
|
@ -0,0 +1,6 @@
|
|||
p= 13013195056445077675245767987987229724588379930923318266833492046660374216223334270611792324721132438307229159984813414250922197169316235737830919431103659
|
||||
q= 12930920340230371085700418586571062330546634389230084495106445639925420450591673769061692508272948388121114376587634872733055494744188467315949429674451947
|
||||
|
||||
e= 100
|
||||
|
||||
C= 2536072596735405513004321180336671392201446145691544525658443473848104743281278364580324721238865873217702884067306856569406059869172045956521348858084998514527555980415205217073019437355422966248344183944699168548887273804385919216488597207667402462509907219285121314528666853710860436030055903562805252516
|
|
@ -1,4 +1,4 @@
|
|||
def grade(autogen, key):
|
||||
if key.find("it's_2017_who_still_uses_php?(jk_82.5%_of_websites)") != -1:
|
||||
if key.find("it's_2017_anD_we're_still_using_PHP???") != -1:
|
||||
return True, "You got it!"
|
||||
return False, "Nope. Keep poking around."
|
||||
|
|
1
web-tunnel/description.md
Normal file
1
web-tunnel/description.md
Normal file
|
@ -0,0 +1 @@
|
|||
I was just going to search some random cat videos on a Saturday morning when my friend came up to me and told me to reach the end of this [tunnel](http://tunnel.web.easyctf.com). Can you do it for me?
|
4
web-tunnel/grader.py
Normal file
4
web-tunnel/grader.py
Normal file
|
@ -0,0 +1,4 @@
|
|||
def grade(autogen, key):
|
||||
if key.find("y0u_sh0uld_b3_t1r3d_tr4v3ll1ng_all_th1s_w4y") != -1:
|
||||
return True, "Nice job! Your journey was fruitful!"
|
||||
return False, "Nope. Dig deeper."
|
7
web-tunnel/problem.yml
Normal file
7
web-tunnel/problem.yml
Normal file
|
@ -0,0 +1,7 @@
|
|||
title: Web Tunnel
|
||||
author: dududum561
|
||||
hint: You should write a script for this. The tunnel goes on too deep for any normal human.
|
||||
category: Web
|
||||
autogen: false
|
||||
programming: false
|
||||
value: 260
|
Loading…
Reference in a new issue