flagArkavidia quals

sayang sekali 2 chall nyaris solve

28/151
Name
Category
Status

Reverse Engineering

Solved

Cryptography

Solved

1

Wibu

Katanya di ITB banyak wibunya.

Author: msfir

Starting off the chall is interesting we were given an elixir executable if im not wrong so after studying i found out that we can compile the code using Eshell

but the code was not that nice to understand so i changed decompilers and i found out that we can use a tool called decompilerl so i went and used that

now the codes are more readable and the encryption function is below what i screenshotted but its pretty simple so we can just reverse the process of encrypting the txt file given

2

Beta Token

Zagreus meet Sisyphus on his way to Olympus and befriended Him. One day, Sisyphus shared a secret to Zagreus. He claimed that this secret was told to him by his Boulder. When Zagreus heard of this secret he merely said, "What a weak secret, anyone can guess that."

GIF

Author: BoredAngel

starting off the challenge we can check out some interesting endpoints including the flag endpoint which checks if we are an admin or not

after i logged in i noticed that the website uses a JWT token thats interesting to i immediately went to the flag endpoint the make the algo to none and changed my role to ADMIN but it didnt seem to work

i remembered i read something similar to this there was a possibility that the secret for the token could be bruteforced so i immediately tried to bruteforce the secret for the token

we actually managed to bruteforced the secret for the jwt this means we can easily craft the admin token and guess what

we solved the challenge

3

TabTabiTab

Tab tabi tab tab tabi tab tab tabi tab tab tabali

Author: um

I upsolved this challenge i was too overthinking at the competition so i couldnt even think straight but sadly the chall was actually super easy i just didnt notice

so the chall basiclly reflects the user login to the cookie if you noticed and if you tried sqlis can actually work this is actually the challenge we can just do a simple sqli and find the table name and i found a flagz_is_here thing i forgot the correct table name but you get it so we can just select the flagz from that table and check out the flask session

4

Weird Format

Have you studied discrete mathematics ⊂(◉‿◉)つ

Author: Etynso

one of the most fun challenge to understand for me

this chall uses a very large N and it uses 2 C

Encryption algorithm :

g1 = g^(r1*(p - 1)) mod n

g2 = g^(r2*(q - 1)) mod n

c1 = (m * g1^s1) mod n

c2 = (m * g2^s2) mod n

s1 s2 are a random number generated g, p and q aswell

so we were given the power of doing an encryption ourselves this will help plenty cause we can just use m = 1 then we can simplify the encryption to

c1 = g1^s1 mod n

c2 = g2^s2 mod n

so just because c1 and c2 are congruent modulo we could actually find the p and q just by doing a simple gcd

now that we have both the p and q we can just use crt to find the m for below

c1 = m mod p

c2 = m mod q

then we could extract the flag

Last updated