PicoCTF 2022 - credstuff
From: picoCTF 2022
Challenge
Points - 100
Category - Cryptography
Description
We found a leak of a blackmarket website’s login credentials. Can you find the password of the user cultiris and successfully decrypt it?
Download the leak here.
The first user in usernames.txt corresponds to the first password in passwords.txt. The second user corresponds to the second password, and so on.
Methodology
- Download the file and extract it
tar -xvf leak.tar
- Find the line where
cultiris
is the username inusernames.txt
. Find the corresponding line inpasswords.txt
and extract the encoded password.- cvpbPGS{P7e1S_54I35_71Z3}
- Use the monoalphabetic substitution cipher decoder in manual mode
- We can extrapolate the first section of the flag as picoCTF.
- That gives us the following:
B = O
C = P
G = T
P = C
S = F
V = I - If you chart it out and start two spaces before C, you will see that the alphabet has been rotated 13 spaces (Ceasar Cipher).
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
A B C D E F G H I J K L M N O P Q R S T U V W X Y ZFlag
picoCTF{C##############3}
- That gives us the following:
- We can extrapolate the first section of the flag as picoCTF.
Tags:
CTF
picoCTF
Cryptography
Written on March 29, 2022