Sorry, I've looked everywhere but I can't find the page you're looking for.
If you follow the link from another website, I may have removed or renamed the page some time ago. You may want to try searching for the page:
Sorry, I've looked everywhere but I can't find the page you're looking for.
If you follow the link from another website, I may have removed or renamed the page some time ago. You may want to try searching for the page:
I've done a courtesy search for the term for you. See if you can find what you're looking for in the list below:
If you haven’t yet registered for our 2020 edition of CyBRICS CTF, you should. Like previous year, it’s made by SPbCTF meetups crew (guys from MSLC / LC↯BC, SiBears, PeterPEN, Yozik), and we invite all teams to play. Unlike previous year, this one is Lite — single online Jeopardy round, everyone is eligible, and you get prizes without playing Attack-Defense! (which is rare nowadays) The same great set of… Continue reading »
Is post quantum cryptography too complex for you? wrong_ring.sage Summary: Ring-LWE with small error, hidden under a number field
Brief solution ideas to the least solved Crypto CTF challenges.
We, in SPbCTF meetups crew (guys from LC↯BC, SiBears, PeterPEN, Yozik), were invited to make a CTF together with some BRICS countries universities. So we made one — and invite everyone to compete, have fun and win some prizes in CyBRICS CTF 2019. This one continues the tradition of hack you events, but this time… Continue reading »
Original Description: Gh0st – Pwn (468) Yikes, one of our finest cyberwarrior plugged into the wrong system. His mind is stuck in the kernel. Bring a plunger and your finest kernel exploit Service: nc 142.93.38.98 6666 | nc pwn.sect.ctf.rocks 6666 Download: gh0st.tar.gz Author: likvidera Summary: linux kernel exploitation using an out-of-bounds kernel memory write.
In this challenge we have a stream cipher based on LFSR and nonlinear filtering function. It has 128-bit LFSR secret state and we are also given 1600 keystream bits. Our goal is simply to recover the key which is the initial state. Here is the nonlinear filtering function: f(v) = v[0] ^ v[1] ^ v[2]… Continue reading »
0ops Cipher 4, hope you enjoy it:) zer0C4.zip nc 202.120.7.220 1234 Summary: related-key attack on weakened variant of RC4
0ops SPN, hope you enjoy it:) zer0SPN.zip Summary: linear cryptanalysis on toy block cipher
0ops Toy Cipher, hope you enjoy it:) zer0TC.zip Summary: meet-in-the-middle and key-schedule constraints
As a tradition, every fall we host a fun lightweight Jeopardy CTF for our freshmen to attract them into all the CTFey goodness. This one will be our fifth year (holy shit!) We invite everyone to check out hack you ’17 this year. Just as always, two separate scoreboards: one for SPbCTF meetups, one for… Continue reading »
Scripts with short explanations: BabyPinhole (crypto 163) Liar’s Trap (crypto/ppc 281) Palindrome Pairs – Challenge Phase (ppc 63+337)
We implemented a random number generator. We’ve heard that rand()’s 32 bit seeds can be easily cracked, so we stayed on the safe side. nc lucky.chall.polictf.it 31337 chall.py Summary: breaking truncated-to-MSB LCG with top-down bit-by-bit search.
A slow descent into the dark, into madness, futility, and despair. BLT.jar (not necessary) STDOUT Flag.java Summary: DSA with short secrets, lattice + meet-in-the-middle attack.
Scripts with short explanations for all crypto tasks (except RSA) from Google CTF Quals 2017: Crypto Backdoor Introspective CRC Shake It RSA CTF Challenge (no writeup, but I think it’s similar to this old one) Rubik Bleichenbacher’s Lattice Task (full writeup here)
Talent Yang loves to customize his own obfuscator. Unfortunately, he lost his seed when he was watching Arsenal’s UEFA game. What a sad day! His team and his seed were lost together. To save him, could you help him to get back his seed? We can not save the game, but we may be able… Continue reading »