DESCRIPTION The RAW Has Got An Input That ISIS Has Planted a Bomb Somewhere In The Pune! Fortunetly, RAW Has Infiltratrated The Internet Activity of One Suspect And They Found This Link. You Have To Find The Location ASAP!
defcookie_decode(data, key): ''' Verify and decode an encoded string. Return an object or None.''' data = tob(data) if cookie_is_encoded(data): sig, msg = data.split(tob('?'), 1) if _lscmp(sig[1:], base64.b64encode(hmac.new(tob(key), msg, digestmod=hashlib.md5).digest())): return pickle.loads(base64.b64decode(msg)) returnNone
if (inputText3.toLowerCase() === "rotor1 i p m rotor2 iv a o rotor3 vi i n") { thirdFour.classList.remove("centered-align"); thirdFour.classList.add("hidden"); } else{ alert("Incorrect deciphering! Try again!") } });
defgenerate_random_number(): whileTrue: num = random.randint(100, 999) first_digit = num // 100 last_digit = num % 10 ifabs(first_digit - last_digit) > 1: return num
defgenerate_random_number_again(): whileTrue: num = random.randint(1000, 9999) if num % 1111 != 0: return num
deftransform(num): number = random.randint(1, 100000) org = number number *= 2 number += 15 number *= 3 number += 33 number /= 6 number -= org if number == 13: num1 = random.randint(1, 6) num2 = random.randint(1, 6) number = num1 * 2 number += 5 number *= 5 number += num2 number -= 25 ifint(number / 10) == num1 and number % 10 == num2: number = generate_random_number() num1 = int(''.join(sorted(str(number), reverse=True))) num2 = int(''.join(sorted(str(number)))) diff = abs(num1 - num2) rev_diff = int(str(diff)[::-1]) number = diff + rev_diff if number == 1088: org = num num *= 2 num /= 3 num += 5 num *= 4 num -= 9 num -= org return num else: number = generate_random_number_again() i = 0 while number != 6174: digits = [int(d) for d instr(number)] digits.sort() smallest = int(''.join(map(str, digits))) digits.reverse() largest = int(''.join(map(str, digits))) number = largest - smallest i += 1
if i <= 7: org = num num *= 2 num += 7 num += 5 num -= 12 num -= org num += 4 num *= 2 num -= 8 num -= org return num else: org = num num **= 4 num /= 9 num += 55 num *= 6 num += 5 num -= 23 num -= org return num else: org = num num *= 10 num += 12 num **= 3 num -= 6 num += 5 num -= org return num else: org = num num += 5 num -= 10 num *= 2 num += 12 num -= 20 num -= org return num
defencrypt(p,key): return''.join(chr(p(transform(i))) for i in key)
from itertools import product from itsdangerous import base64_decode, base64_encode from tqdm import tqdm import numpy as np import random
polyc = [4,3,7] poly = np.poly1d(polyc) defencrypt(p,key): # return''.join(chr(p(i)) for i in key)
dic={} for new_key in tqdm(product(range(256))): key=bytes(new_key) enc = encrypt(poly,key) dic[enc] = key example_enc = "☞➭⥄⫣Ⲋ⸹⿰ㆯ㍶☞⒗☞☞☞➭☞⥄☞⫣☞Ⲋ☞⸹☞⿰☞ㆯ☞㍶➭⒗➭" p=b'' for i in example_enc: p+=dic[i] print(p)
# my secret to hide the combination of my safe in fornt of all without anyone getting a clue what it is ;)
#some boring python function for conversion nothing new defstr_to_ass(input_string): ass_values = [] for char in input_string: ass_values.append(str(ord(char))) ass_str = ''.join(ass_values) return ass_str
input_string = input("Enter the Combination: ") result = str_to_ass(input_string) msg = int(result)
#not that easy, you figure out yourself what the freck is a & z a = z =
f = (? * ?) #cant remember what goes in the question mark e = #what is usually used
#ohh yaa!! now you cant figure out $h!t encrypted = pow(msg, e, f) print(str(encrypted))
#bamm!! protection for primes number = bin = bin(number)[2:]
#bamm!! bamm!! double protection for primes bin_arr = np.array(list(bin), dtype=int) result = np.sin(bin_arr) result = np.cos(bin_arr) np.savetxt("file1", result) np.savetxt("file2", result)
defass_to_str(input_string): result = '' for i inrange(0, len(input_string), 2): code_point = int(input_string[i:i+2])
result += chr(code_point) return result
#cos #cos(1)=0.5... #cos(0)=1 first="" withopen('file1.txt', 'r') as file: for line in file: ifint(line[0]) == 1: first=''.join([first,"0"]) else: first=''.join([first,"1"])
#sin #sin(1)=0.8 #sin(0)=0 print() second="" withopen('file2.txt', 'r') as file: for line in file: ifint(line[0]) == 0: second=''.join([second,"0"]) else: second=''.join([second,"1"]) # sol RSA p=int(first, base=2) q=int(second,base=2)
DESCRIPTION Me and my friends just finished our final semester of B.Tech, so we decided to have a trip somewhere, but due to some reason, many of them were not available for the trip, but we were all ok as less is more. As the trip was about to end, one of my friends said we should try scuba diving here. I was scared of that, but my friends said, If you don't risk anything, you risk everything. Seriously, why do we have to risk our lives for half an hour? It's impossible for me, I said. But they motivated me all night, and then it was time for the dive. I screamed, Impossible is not a word in my vocabulary, and dived in. After all this, when I came back to my room, I realised I was low on money, so I called and asked my father for some help by singing something like this:
I’d be gone to my dad And ask for some cash I ran ......
All the Hustle towards the trip was worth it, as we enjoyed it a lot and made some awesome memories throughout the trip.
Flag format: VishwaCTF{My Name according to story_Amount I got in figures}
DESCRIPTION TryHackMe is a browser-based cyber security training platform, with learning content covering all skill levels from the complete beginner to the seasoned hacker.
One of our team member is very active on the platform. Recently, I got to know that he comes under 3% in the global leaderboard. Impressive isn't it.
Maybe you should have a look at his profile
PS : He keeps his digital identity very simple. No fancy usernames. It's just a simple mathematics
DESCRIPTION In the labyrinth of binary shadows, Elliot finds himself standing at the crossroads of justice and chaos. Mr. Robot, the enigmatic leader of the clandestine hacktivist group, has just unleashed a digital storm upon Evil Corp's fortress. The chaos is palpable, but this is just the beginning.
As the digital tempest rages, Elliot receives a cryptic message from Mr. Robot. "To bring down Evil Corp, we must cast the shadows of guilt upon Terry Colby," the message echoes in the encrypted channels. However, in the haze of hacktivism, Elliot loses the crucial IP address and the elusive name of the DAT file, leaving him in a digital conundrum.
To navigate this cybernetic maze, Elliot must embark on a quest through the binary underbelly of Evil Corp's servers. The servers, guarded by firewalls and encrypted gatekeepers, conceal the secrets needed to ensure Terry Colby's fall.
Guide Elliot to the his destiny.
Flag Format : VishwaCTF{name of DAT file with extension_IP address of Terry Colby}
Q1 of 10 : So it was decided, to obtain the divine potion of immortality, churning of the ocean is to be performed. For that purpose a huge mountain was used. Tell me what is the name of the mountain and also which ocean was churned to obtain the potion of immortality? Ans fromat : name of ocean without space_name of mountain kshirasagara_mandara Q2 of 10 :Let's get step back. Mount Mandara was used in churning. But it was not just around the ocean. It was brought there by someone. So, who brought Mount Mandara to Kshirasagara? Garuda Q3 of 10 : Now the stage is set but to churn the ocean, something was required which both the groups would hold and churn. Who was used like a rope to churn the ocean Kshirasagara? Vasuki Q4 of 10 : The process starts and the outcomes begin to appear. One such outcome was a very threatening substance, which had the power to destroy the whole universe. But 'The Ultimate Destroyer' comes to rescue and consumed it, which results in his throat turning blue hence he is also called 'Neelakantha'. What is the substance called? Halahala Q5 of 10 : Let's talk about few more outcomes. One such divine outcome was a tree. It was taken to the abode of Indra in swarga. It is often referred to as 'Wish Fulfilling Tree' as it possess the power to bring one's imagination into reality. Tell me the name of this tree? Kalpavrikshaa Q6 of 10 : Another creature appeared was a very powerful elephant which was taken by Lord Indra as his medium of transportation. It was very powerful elephant and also referred sometimes as 'King of Elephants'. What is the name of that elephant? Airavata Q7 of 10 : After a while during the process, a bow appeared during the churning. It was given to Lord Vishnu as a weapon. What is the name of that divine bow? Sharanga Q8 of 10 : In ancient times as mentioned in the scriptures, conch was used as a sign to initiate a war between two groups (also used for other purposes as well). Different persons from both the sides would blow the conch which will mark the start of the war. During the churning, one such conch was obtained and it was given to Lord Vishnu. It's sound symbolizes the 'Sound of Creation'. What is the name of the conch? Panchajanya Q9 of 10 : The fortunes turned as the goddess of fortune herself appeared. Every wanted the goddess of fortune to be at their side, but the destiny has it's own plan. She chose Lord Vishnu as her eternal consort.. Who is the goddess of fortune? Lakshmi Q10 of 10 : Ok, let's end this thing. After all the struggle from both the sides, the long wait comes to an end. The divine potion is here and it is brought by none other than the physician of the devas. He is also referred to as 'God of Ayurveda'. Tell me his name and also the name of divine potion? Ans format : name of the physicianname of divine potion Dhanvantari_Amrita Impressive. A perfect 10/10. You are one the who deserves the flag. Just one last thing. All the event which is I asked you about is very popular and is mentioned in various scriptures like Vishnu Purana, Mahabharata, etc. Can you tell me what this event is popularly known as? Use in place of any space Samudra_Manthana Perfect. That's all about this challenge. Hope you enjoyed it. Thank you for playing VishwaCTF'24. Here you go with the flag for the challenge 'Sagar Sangram' VishwaCTF{karmany-evadhikaras te ma phaleshu kadachana ma karma-phala-hetur bhur ma te sango stvakarmani}
Flag: VishwaCTF{karmany-evadhikaras te ma phaleshu kadachana ma karma-phala-hetur bhur ma te sango stvakarmani}
naup96321@DESKTOP-T2ED0OK:~/vish$ steghide info g.jpg "g.jpg": format: jpeg capacity: 185.8 KB Try to get information about embedded data ? (y/n) y Enter passphrase: embedded file "not_a_secret.txt": size: 114.0 Byte encrypted: rijndael-128, cbc compressed: yes naup96321@DESKTOP-T2ED0OK:~/vish$ ls g.jpg k.txt m.py main.py r.py 'we_are_valorant (1).jpg:Zone.Identifier' naup96321@DESKTOP-T2ED0OK:~/vish$ steghide extract -sf g.jpg -xf not_a_secret.txt -p Tenz wrote extracted data to "not_a_secret.txt". naup96321@DESKTOP-T2ED0OK:~/vish$ ls g.jpg k.txt m.py main.py not_a_secret.txt r.py 'we_are_valorant (1).jpg:Zone.Identifier' naup96321@DESKTOP-T2ED0OK:~/vish$ cat not_a_secret.txt Hello!! hope you are enjoying the CTF here's your flag