Added challenge 247
This commit is contained in:
parent
649c2f0337
commit
6904e909c6
BIN
247/level3.flag.txt.enc
Normal file
BIN
247/level3.flag.txt.enc
Normal file
Binary file not shown.
1
247/level3.hash.bin
Normal file
1
247/level3.hash.bin
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD>`EŒÆBCº;ˆø¿Ï¢ië
|
45
247/level3.py
Normal file
45
247/level3.py
Normal file
@ -0,0 +1,45 @@
|
||||
import hashlib
|
||||
|
||||
### THIS FUNCTION WILL NOT HELP YOU FIND THE FLAG --LT ########################
|
||||
def str_xor(secret, key):
|
||||
#extend key to secret length
|
||||
new_key = key
|
||||
i = 0
|
||||
while len(new_key) < len(secret):
|
||||
new_key = new_key + key[i]
|
||||
i = (i + 1) % len(key)
|
||||
return "".join([chr(ord(secret_c) ^ ord(new_key_c)) for (secret_c,new_key_c) in zip(secret,new_key)])
|
||||
###############################################################################
|
||||
|
||||
flag_enc = open('level3.flag.txt.enc', 'rb').read()
|
||||
correct_pw_hash = open('level3.hash.bin', 'rb').read()
|
||||
|
||||
|
||||
def hash_pw(pw_str):
|
||||
pw_bytes = bytearray()
|
||||
pw_bytes.extend(pw_str.encode())
|
||||
m = hashlib.md5()
|
||||
m.update(pw_bytes)
|
||||
return m.digest()
|
||||
|
||||
|
||||
def level_3_pw_check():
|
||||
user_pw = input("Please enter correct password for flag: ")
|
||||
user_pw_hash = hash_pw(user_pw)
|
||||
|
||||
if( user_pw_hash == correct_pw_hash ):
|
||||
print("Welcome back... your flag, user:")
|
||||
decryption = str_xor(flag_enc.decode(), user_pw)
|
||||
print(decryption)
|
||||
return
|
||||
print("That password is incorrect")
|
||||
|
||||
|
||||
|
||||
level_3_pw_check()
|
||||
|
||||
|
||||
# The strings below are 7 possibilities for the correct password.
|
||||
# (Only 1 is correct)
|
||||
pos_pw_list = ["8799", "d3ab", "1ea2", "acaf", "2295", "a9de", "6f3d"]
|
||||
|
Loading…
Reference in New Issue
Block a user