tag:blogger.com,1999:blog-3650259870998252242.post4762443677827983045..comments2023-10-20T18:17:56.706+02:00Comments on the world. according to koto: How to Beathis! challenge - the solutionsAnonymoushttp://www.blogger.com/profile/11516786094492717236noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-3650259870998252242.post-47146556459687895232011-03-24T14:10:52.818+01:002011-03-24T14:10:52.818+01:00Hm, I just played with CrypTool - it has many cryp...Hm, I just played with CrypTool - it has many crypto features. But it is for Windows and I decided to write analog for it's xor analysis feature for linux.<br />The algorithm is easily guessable: try different length of the key to produce a plaintext that contains as much as possible equal chars. Then calculate a key to make all that chars equal to a given one.<br />No magic, really :)Alexey Hellmanhttp://twitter.com/hellman1908noreply@blogger.comtag:blogger.com,1999:blog-3650259870998252242.post-48960744815578292692011-03-24T13:44:06.945+01:002011-03-24T13:44:06.945+01:00Funny thing - wrrr gave me the link to your tool i...Funny thing - wrrr gave me the link to your tool in the middle of the challenge, and I saw you published it just two months ago. And then I saw you in the challenge, talk about coincidence :) <br /><br />Through a quick look though, your xortool uses a different method and only asks for most popular letter, do you have any links where this methodology is described?kkotowiczhttp://blog.kotowicz.netnoreply@blogger.comtag:blogger.com,1999:blog-3650259870998252242.post-60687029018431647322011-03-24T13:37:28.323+01:002011-03-24T13:37:28.323+01:00Glad you liked it :) As for the ZIP, yeah, I know ...Glad you liked it :) As for the ZIP, yeah, I know it, but I only just learned that from wrrr 2 days ago. He was actually reading the ZIP format and started fixing the file manually (it took looong). My respect for the effort :)kkotowiczhttp://blog.kotowicz.netnoreply@blogger.comtag:blogger.com,1999:blog-3650259870998252242.post-4370691826569806252011-03-24T13:35:03.140+01:002011-03-24T13:35:03.140+01:00Nice crypto challenge! Had fun solving it :) Thoug...Nice crypto challenge! Had fun solving it :) Though, it was really easy. The only places to stuck a bit for me were ROT47 and drowssap. I found that it is shifted by 47, but the boundaries were not obvious. Also, googling 'drowssap' did the thing and it was done :)<br /><br />PS: to decrypt the last challenges I used similar to your break.py my tool<br />https://github.com/hellman/xortoolAlexey Hellmanhttp://twitter.com/hellman1908noreply@blogger.comtag:blogger.com,1999:blog-3650259870998252242.post-88681437649364844072011-03-24T13:18:40.540+01:002011-03-24T13:18:40.540+01:00Hey,
Thanks for the hackme, I really enjoyed it :...Hey,<br /><br />Thanks for the hackme, I really enjoyed it :)<br /><br />About the "Almost Valid" ZIP file in level 6 - it was simple to make it valid. All it took was to change the "DE AD BE EF" bytes (last 4 bytes) to 00 00 00 00 ;><br /><br />As a side note - did you know that a ZIP files don't have to start with a "PK"? I've actually learned about that not long ago. ZIP has the main header at the *end* of the file (actually, it can be offset at most 64k from the end, due to a variable length comment field). The fact that ZIPs commonly start with "PK" is almost an accident and it is not always the case (see GIFAR as a good example).<br /><br />Thanks for the IoC method btw ;) It's cool ;)<br /><br />Cheers!Gynvael Coldwindhttp://profiles.google.com/gynvaelnoreply@blogger.com