Skip to content

Commit b2b1e91

Browse files
committed
writeup update: angstrom2021-crypto10: Oracle of Blair
1 parent c671ceb commit b2b1e91

File tree

1 file changed

+2
-2
lines changed
  • cryptography/angstrom2021/oracle_of_blair

1 file changed

+2
-2
lines changed

cryptography/angstrom2021/oracle_of_blair/WRITEUP.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111

1212
My favorite challenge in this CTF! We have server code, which take an input from us, replace any "*{}*" occurrence with flag string and then apply some cryptography to it.
1313

14-
First I tried to get flag size. Sending '*{}*' to server and get 32bytes of data, meaning that flag length is in range 17 to 32. All we need to is add character to the string one by one and see the results.
14+
First I tried to get flag size. Sending '*{}*' to server and get 32bytes of data, meaning that flag length is in range 17 to 32. All we need to do is adding character to the string one by one and see the results.
1515

1616
for i in range(16):
1717
pd1 = 'a'*i + '{}'
@@ -31,7 +31,7 @@ Then **inp** will be:
3131

3232
aaaaaaaactf{XXXX XXXXXXXXXXXXXXX} aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaa
3333

34-
Now, let's call first 16 characters of '*a*' **C1** and second 16 characters of '*a*' **C2** and "*XXXXXXXXXXXXXXX}*" **C0**. The server response will be 128 hex characters representing 64bytes of data. According to last sentence, the last 16bytes of server response will be **P2**, the bytes before that will be **P1**. We know **I2**=**I1** (CBC mode basics!). We also know that **C1**^**I2**=**P2** ('*^*' is **XOR** operator). So we have **C1**^**P2**=**I2**.
34+
Now, let's call first 16 characters of '*a*' **C1** and second 16 characters of '*a*' **C2** and "*XXXXXXXXXXXXXXX}*" **C0**. The server response will be 128 hex characters representing 64bytes of data. According to previous sentence, the last 16bytes of server response will be **P2**, the 16bytes before that will be **P1**. We know **I2**=**I1** (**C1**=**C2** and CBC mode basics!). We also know that **C1**^**I2**=**P2** ('*^*' is **XOR** operator). So we have **C1**^**P2**=**I2**.
3535

3636
We know all of this for previous block too, **C0**^**P1**=**I1**. We know **C1**, **P1**, **P2**. Then we can calculate **C0** as:
3737

0 commit comments

Comments
 (0)