Skip to main content

IceCTF 2018 - Garfeld [Cryptography]

Garfeld - 1. Cryptography
Author: 5ynax

Worth: $100

Description








At the start of the challenge you are provided with the following image:
Based on the picture, you can see that there is an encrypted message at the bottom of the picture. You will also notice that there is a number in the upper right corner of the image that looks like a date.

If you google "07271978" you will find the following Garfield cartoon strip:



This shows the date is relevant in some way shape or form. Plus, its a great example of a good old fashioned Garfield cartoon strip. 

Back to the cryptographic message, we notice that the format is already in the IceCTF{flag} format that we are looking for so we can confidently say this is the encrypted flag.

If you look at the first part of the encrypted string "IjgJUO" you will see that it is the same amount of letters as IceCTF. It is probably safe to assumed that the number of letters is not changed during the encryption process. Additionally, it is most likely that a substitution cipher is being used since the letter C is always mapped to J in "IjgJUO." Since the number in the upper right corner of the picture appears to be relevant, it is also safe to assume that is a key used in the encryption process. 

My first thought was that the cipher used was some sort of Vignere cipher, but we had a number instead of a word or phrase so I kept looking for additional ciphers that could have been used. Some quick searching in Google led me to the Gronsfeld cipher. It is similar to the Vignere cipher except is uses numbers, and it actually more closely resembles a Caesar cipher where the key being used to determine how each letter of the plain text phrase is rotated versus a standard Caesar cipher where every letter is rotated using the same key. 

Putting the encrypted phrase into a decryption routine (script or online decryption tool if you're lazy like me) and you end up decrypting the encrypted phrase to :

This specific decryption tool did not respect the case of the original flag, so when the flag is entered, you need to enter it as IceCTF{I_DONT_THINK_GRONSFELD_LIKES_MONDAYS}.

Comments

Popular posts from this blog

Emotet Downloader Write-Up

This write-up is for a macro embedded doc used as a downloader for Emotet. Author: 5k33tz MD5: 43d2a3df73fdcb10b9429a480d96ddcf This sample first came to my attention by way of an alert for a download from an Emotet related URL. Looking at the PCAP I see a GET request to imdavidlee.com/9493MG/biz/US After grabbing the file from the source and hashing it, I realized there were already 21/44 detections on VT. So I wanted to do some manual analysis to strengthen my skills and see how this sample works. Running file against the sample: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Arorupyzheh-PC, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sat Aug 25 00:31:00 2018, Last Saved Time/Date: Sat Aug 25 00:31:00 2018, Number of Pages: 1, Number of Words: 3, Number of Characters: 21, Security: 0 We can see it's a Word Doc, but probably the

IceCTF 2018 - Picasso [Forensics]

Forensics – 1. Picasso Author: 5ynax and Valrkey Worth:  $150 Description: The challenge involved a GIF that we needed to extract a message from. So, for this challenge, we had two ways that we solved it at almost the same time. We have the long (5ynax) way and we have the fast (valrkey) way. The Long Way In the long way, I decided to extract each frame of the automated GIF and then import them into GIMP to layer them on top of one another. I used an online tool to get all of the frames, there was a lot of them, I used https://ezgif.com/split. After I got the frames split up, I downloaded them and moved them to my box with GIMP ready for analysis. I later learned that I could have just imported the GIF into GIMP directly using the open as layers routine, but that's neither here nor there. For each layer there is an Alpha Channel. In GIMP under the colors menu, you can select the Color to Alpha Routine to get this box: This allows you to choose a color an

IceCTF 2018 – Anticaptcha [Miscellaneous]

Miscellaneous – 2. Anticaptcha Author: valrkey Worth: $250 Description:  Wow, this is a big captcha. Who has enough time to solve this? Seems like a lot of effort to me! As you can tell by the tiny scroll bar, there were a large number of questions (609) to be answered. To make things more difficult, each time the question was visited, the order and numeric value would be randomized. The questions generally followed one of three formats: What is the # word in the following line: ...? Is # a prime number? What is the greatest common divisor of # and #? For each of these question formats, I wrote a PowerShell function to determine the answer. Word in Line This function takes in the INDEX of the word requested and the LINE to take the word from. I added a line word length check just in case the IceCTF staff are jerks and give a too-large index. Everything should be accounted for the after mapping the 1st word" to the 0th array index and getting rid of any