Update writeup.md
This commit is contained in:
@@ -4,7 +4,8 @@ To crack the password, we can attempt to guess it. However, that can take a long
|
|||||||
|
|
||||||
First, we will run the command ``zip2john TopSecret.zip > myzip`` as seen in the following screenshot. Running this command will covert it into a format that can be cracked using John The Ripper.
|
First, we will run the command ``zip2john TopSecret.zip > myzip`` as seen in the following screenshot. Running this command will covert it into a format that can be cracked using John The Ripper.
|
||||||
|
|
||||||
![[challenges/misc/Chef/images/cimg-1.png]]
|

|
||||||
|
|
||||||
|
|
||||||
Once done, we can use any wordlist. In this example, we will be using ``rockyou.txt`` which can be found in the ``/usr/share/wordlists/rockyou.txt`` if you are using Kali Linux. You may choose your own wordlist for this challenge. The command will be:
|
Once done, we can use any wordlist. In this example, we will be using ``rockyou.txt`` which can be found in the ``/usr/share/wordlists/rockyou.txt`` if you are using Kali Linux. You may choose your own wordlist for this challenge. The command will be:
|
||||||
|
|
||||||
@@ -16,15 +17,17 @@ Command breakdown:
|
|||||||
- ``--wordlist=/usr/share/wordlists/rockyou.txt`` - Specifies the wordlist that John The Ripper will use.
|
- ``--wordlist=/usr/share/wordlists/rockyou.txt`` - Specifies the wordlist that John The Ripper will use.
|
||||||
- ``myzip`` - Specifies the file that contains the hash that we want to crack.
|
- ``myzip`` - Specifies the file that contains the hash that we want to crack.
|
||||||
|
|
||||||
![[cimg-2]]
|

|
||||||
|
|
||||||
After running the command, we can see that the password is ``secret``. We can unzip the file by using the command ``unzip TopSecret.zip`` or right click the file in the File Explorer > Extract Here > Enter the password as seen in the following screenshots.
|
After running the command, we can see that the password is ``secret``. We can unzip the file by using the command ``unzip TopSecret.zip`` or right click the file in the File Explorer > Extract Here > Enter the password as seen in the following screenshots.
|
||||||
|
|
||||||
Extracting the file:
|
Extracting the file:
|
||||||
![[cimg-3]]
|
|
||||||
|

|
||||||
|
|
||||||
Entering the password:
|
Entering the password:
|
||||||
![[cimg-4]]
|
|
||||||
|

|
||||||
|
|
||||||
Upon extracting the folder, we can see a file called ``flag.txt``. Opening the text file presents us with the following contents:
|
Upon extracting the folder, we can see a file called ``flag.txt``. Opening the text file presents us with the following contents:
|
||||||
|
|
||||||
@@ -34,7 +37,7 @@ There once lived a chef in the cyber realm. The chef owned 64 bases around the w
|
|||||||
The chef is sad that his once world renowned recipe became: VVJLe0d1M19GM2NyRV9GM3BlM2dfRXJQdmMzfQ==
|
The chef is sad that his once world renowned recipe became: VVJLe0d1M19GM2NyRV9GM3BlM2dfRXJQdmMzfQ==
|
||||||
```
|
```
|
||||||
|
|
||||||
![[cimg-5]]
|

|
||||||
|
|
||||||
We can see that the flag is most likely the recipe. Reading the lines, we can see that there are some clues as to how we can decrypt the recipe.
|
We can see that the flag is most likely the recipe. Reading the lines, we can see that there are some clues as to how we can decrypt the recipe.
|
||||||
|
|
||||||
@@ -42,8 +45,16 @@ From the word "64 bases" we can assume that base64 is at play. We can confirm th
|
|||||||
|
|
||||||
To decrypt the recipe, we can use a tool called CyberChef (https://gchq.github.io/CyberChef/). Inputting the base64 string on the right and selecting the "From Base64" recipe reveals a part of the flag.
|
To decrypt the recipe, we can use a tool called CyberChef (https://gchq.github.io/CyberChef/). Inputting the base64 string on the right and selecting the "From Base64" recipe reveals a part of the flag.
|
||||||
|
|
||||||
![[cimg-6]]
|

|
||||||
|
|
||||||
To further decrypt this, we can use the "ROT13" operator. As we can see in the following screenshot, we managed to obtain the flag in the output. The flag is ``HEX{Th3_S3peR_S3cr3t_ReCip3}``
|
To further decrypt this, we can use the "ROT13" operator. As we can see in the following screenshot, we managed to obtain the flag in the output. The flag is ``HEX{Th3_S3peR_S3cr3t_ReCip3}``
|
||||||
|
|
||||||
![[cimg-7]]
|

|
||||||
|
|
||||||
|
#### Glossary:
|
||||||
|
|
||||||
|
Base64 is a binary to text encoding scheme that represents the binary data in American Standard Code for information Interexchange (ASCII) string format.
|
||||||
|
|
||||||
|
A Caesar Cipher is a type of substitution cipher that shifts letters in a message to make it unreadable.
|
||||||
|
|
||||||
|
ROT13 is a type of Caesar Cipher that substitutes the character with the 13th letter after it. An example will be where "A" will be substituted by "N".
|
||||||
|
|||||||
Reference in New Issue
Block a user