Crypto CTFs Tricks
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Google it
https://gchq.github.io/CyberChef/ (Magic module)
Most of encoded data can be decoded with these 2 ressources:
https://quipqiup.com/ - Very good !
Check all these bases with: https://github.com/dhondta/python-codext
Ascii85
BQ%]q@psCd@rH0l
Base26 [A-Z]
BQEKGAHRJKHQMVZGKUXNT
Base32 [A-Z2-7=]
NBXWYYLDMFZGCY3PNRQQ====
Zbase32 [ybndrfg8ejkmcpqxot1uwisza345h769]
pbzsaamdcf3gna5xptoo====
Base32 Geohash [0-9b-hjkmnp-z]
e1rqssc3d5t62svgejhh====
Base32 Crockford [0-9A-HJKMNP-TV-Z]
D1QPRRB3C5S62RVFDHGG====
Base32 Extended Hexadecimal [0-9A-V]
D1NMOOB3C5P62ORFDHGG====
Base45 [0-9A-Z $%*+-./:]
59DPVDGPCVKEUPCPVD
Base58 (bitcoin) [1-9A-HJ-NP-Za-km-z]
2yJiRg5BF9gmsU6AC
Base58 (flickr) [1-9a-km-zA-HJ-NP-Z]
2YiHqF5bf9FLSt6ac
Base58 (ripple) [rpshnaf39wBUDNEGHJKLM4PQ-T7V-Z2b-eCg65jkm8oFqi1tuvAxyz]
pyJ5RgnBE9gm17awU
Base62 [0-9A-Za-z]
g2AextRZpBKRBzQ9
Base64 [A-Za-z0-9+/=]
aG9sYWNhcmFjb2xh
Base67 [A-Za-z0-9-.!~_]
NI9JKX0cSUdqhr!p
Base85 (Ascii85) [!"#$%&'()*+,-./0-9:;<=>?@A-Z[\]^_`a-u]
BQ%]q@psCd@rH0l
Base85 (Adobe) [!"#$%&'()*+,-./0-9:;<=>?@A-Z[\]^_`a-u]
<~BQ%]q@psCd@rH0l~>
Base85 (IPv6 or RFC1924) [0-9A-Za-z!#$%&()*+-;<=>?@^`{|}~_]
Xm4y
V_|Y(V{dF>`
Base85 (xbtoa) [!"#$%&'()*+,-./0-9:;<=>?@A-Z[\]^_`a-u]
xbtoa Begin\nBQ%]q@psCd@rH0l\nxbtoa End N 12 c E 1a S 4e6 R 6991d
Base85 (XML) [0-9A-Za-y!#$()*+,-./:;=?@^`{|}~z_]
Xm4y|V{~Y+V}dF?
Base91 [A-Za-z0-9!#$%&()*+,./:;<=>?@[]^_`{|}~"]
frDg[*jNN!7&BQM
Base100 []
👟👦👣👘👚👘👩👘👚👦👣👘
Base122 []
4F ˂r0Xmvc
ATOM-128 [/128GhIoPQROSTeUbADfgHijKLM+n0pFWXY456xyzB7=39VaqrstJklmNuZvwcdEC]
MIc3KiXa+Ihz+lrXMIc3KbCC
HAZZ15 [HNO4klm6ij9n+J2hyf0gzA8uvwDEq3X1Q7ZKeFrWcVTts/MRGYbdxSo=ILaUpPBC5]
DmPsv8J7qrlKEoY7
MEGAN35 [3G-Ub=c-pW-Z/12+406-9Vaq-zA-F5]
kLD8iwKsigSalLJ5
ZONG22 [ZKj9n+yf0wDVX1s/5YbdxSo=ILaUpPBCHg8uvNO4klm6iJGhQ7eFrWczAMEq3RTt2]
ayRiIo1gpO+uUc7g
ESAB46 []
3sHcL2NR8WrT7mhR
MEGAN45 []
kLD8igSXm2KZlwrX
TIGO3FX []
7AP9mIzdmltYmIP9mWXX
TRIPO5 []
UE9vSbnBW6psVzxB
FERON74 []
PbGkNudxCzaKBm0x
GILA7 []
D+nkv8C1qIKMErY1
Citrix CTX1 []
MNGIKCAHMOGLKPAKMMGJKNAINPHKLOBLNNHILCBHNOHLLPBK
http://k4.cba.pl/dw/crypo/tools/eng_atom128c.html - 404 Dead: https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng_hackerize.html
Letters to their numerical value
Letter to num (ax+b)%26
(a and b are the keys and x is the letter) and the result back to letter
Multitap replaces a letter by repeated digits defined by the corresponding key code on a mobile phone keypad (This mode is used when writing SMS). For example: 2=A, 22=B, 222=C, 3=D... You can identify this code because you will see** several numbers repeated**.
You can decode this code in: https://www.dcode.fr/multitap-abc-cipher
Substitude each letter for 4 As or Bs (or 1s and 0s)
Raw Deflate and Raw Inflate (you can find both in Cyberchef) can compress and decompress data without headers.
A keywork is needed
A keywork is needed
2 base64 strings (token and key)
A secret is splitted in X parts and to recover it you need Y parts (Y <=X).
http://christian.gen.co/secrets/
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)