PicoCTF 2022 - credstuff

From: picoCTF 2022


Challenge

Points - 100
Category - Cryptography

Description

We found a leak of a blackmarket website’s login credentials. Can you find the password of the user cultiris and successfully decrypt it?

Download the leak here.

The first user in usernames.txt corresponds to the first password in passwords.txt. The second user corresponds to the second password, and so on.

Methodology

  1. Download the file and extract it
    tar -xvf leak.tar
  2. Find the line where cultiris is the username in usernames.txt. Find the corresponding line in passwords.txt and extract the encoded password.
    • cvpbPGS{P7e1S_54I35_71Z3}
  3. Use the monoalphabetic substitution cipher decoder in manual mode
    • We can extrapolate the first section of the flag as picoCTF.
      • That gives us the following:
        B = O
        C = P
        G = T
        P = C
        S = F
        V = I
      • If you chart it out and start two spaces before C, you will see that the alphabet has been rotated 13 spaces (Ceasar Cipher).
        N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
        A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

        Flag

        picoCTF{C##############3}
        


Tags: CTF  picoCTF  Cryptography 

Written on March 29, 2022