Skip to content

Latest commit

 

History

History
17 lines (15 loc) · 970 Bytes

README.md

File metadata and controls

17 lines (15 loc) · 970 Bytes

Write-Up

Challenge : Take It Easy

Difficulty : Eas

Step - I :

Unzip the challenge file to get getkey.txt and a password protected zip TRYME.zip.
To get the password of the zip you solve a simple RSA problem by this exploit.
This is also known as low exponent attack.

Step - II :

With the password you can unzip TRYME.zip and find the chall file.
The flag is divided into chunks of four and each chunk is XORed with next of the next chunk (chunk + 2)th chunk.
As flag is in usual format, you already know first 2 chunks dark and CON{ and the XORed ciphertext chunks are also given. By XOR property, if chunk1 ^ chunk3 = ct1 then chunk3 = ct1 ^ chunk1. In this way all chunks can be recovered.
The exploit is provided here.

Flag :

darkCON{n0T_Th@t_haRd_r1Ght}