Skip to content

Latest commit

 

History

History
31 lines (21 loc) · 1.32 KB

Tapping.md

File metadata and controls

31 lines (21 loc) · 1.32 KB

Tapping

Cryptography, 200 points

Description:

Theres tapping coming in from the wires.

Solution:

Let's connect to the service:

root@kali:/media/sf_CTFs/pico/Tapping# nc 2019shell1.picoctf.com 37920
.--. .. -.-. --- -.-. - ..-. { -- ----- .-. ... ...-- -.-. ----- -.. ...-- .---- ... ..-. ..- -. ..... ---.. ...-- ----. ----- ----- ----. ---.. .---- }

This looks like morse code.

We can decode this with the CyberChef Online API.

If you're using Kali, the NPM package which comes with the OS is outdated, and in order to update it you need to follow these instructions. Then, you can install the CyberChef package globally using npm install -g cyberchef --unsafe-perm=true --allow-root.

Now we can decode the message using:

root@kali:/media/sf_CTFs/pico/Tapping# export NODE_PATH=$(npm root --quiet -g)
root@kali:/media/sf_CTFs/pico/Tapping# node
> const chef = require("cyberchef");
> chef.fromMorseCode(".--. .. -.-. --- -.-. - ..-.").toString() + "{" + chef.fromMorseCode(" -- ----- .-. ... ...-- -.-. ----- -.. ...-- .---- ... ..-. ..- -. ..... ---.. ...-- ----. ----- ----- ----. ---.. .---- ").toString() + "}"
'PICOCTF{M0RS3C0D31SFUN583900981}'