189
0
0

SpyFi [picoCTF 2018]

Published at October 11, 2018 1:08 a.m.

Problem

James Brahm, James Bond's less-franchised cousin, has left his secure communication with HQ running, but we couldn't find a way to steal his agent identification code. Can you?
Conect with nc 2018shell3.picoctf.com 33893.

spy_terminal_no_flag.py
python
#!/usr/bin/python2 -u
from Crypto.Cipher import AES

agent_code = """flag"""

def pad(message):
    if len(message) % 16 != 0:
        message = message + '0'*(16 - len(message)%16 )
    return message

def encrypt(key, plain):
    cipher = AES.new( key.decode('hex'), AES.MODE_ECB )
    return cipher.encrypt(plain).encode('hex')

welcome = "Welcome, Agent 006!"
print welcome

sitrep = raw_input("Please enter your situation report: ")
message = """Agent,
Greetings. My situation report is as follows:
{0}
My agent identifying code is: {1}.
Down with the Soviets,
006
""".format( sitrep, agent_code )

message = pad(message)
print encrypt( """key""", message )

Solution

ECBなので当てていく。
My agent identifying code is: picoCTF{@g3nt6_1$_th3_c00l3$t_9121600}

ruby
require 'socket'

def get(x)
  s = TCPSocket.new('2018shell3.picoctf.com', 33893)
  l = ''
  l = s.readpartial(10000) until l.include? ':'
  s.puts x
  res=[s.gets].pack("H*")
  s.close
  res
end

ZEROPAT = ['3fea1ff4d9f3bf45101b55ea6628a237'].pack("H*")

zerocnt = 27
headpad = 11
tailpad = 0

s = "My agent identifying code is: "
ch = [*?a..?z,*?A..?Z,*?0..?9].join + '{}_?!@#$%&($#){}'
ch = ch.chars.uniq

100.times do |i|
  res = get('a'*headpad + '0'*16 + ch.map{|c| (s+c)[-16,16]}.join + ' '*((16-i+tailpad)%16))
  p res.index(ZEROPAT)
  dict = res[res.index(ZEROPAT)+16, ch.size*16].chars.each_slice(16).each_with_index.map{|x, i| [ch[i], x.join]}
  dict = Hash[*dict.flatten(1)]
  p dict.select{|k,v| res.index(v, res.index(v)+1)}
  s += dict.find{|k,v| res.index(v, res.index(v)+1)}[0]
  p s
end