48 lines
1.3 KiB
Python
Executable File
48 lines
1.3 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
|
|
import hashlib
|
|
|
|
### THIS FUNCTION WILL NOT HELP YOU FIND THE FLAG --LT ########################
|
|
def str_xor(secret, key):
|
|
#extend key to secret length
|
|
new_key = key
|
|
i = 0
|
|
while len(new_key) < len(secret):
|
|
new_key = new_key + key[i]
|
|
i = (i + 1) % len(key)
|
|
return "".join([chr(ord(secret_c) ^ ord(new_key_c)) for (secret_c,new_key_c) in zip(secret,new_key)])
|
|
###############################################################################
|
|
|
|
flag_enc = open('level3.flag.txt.enc', 'rb').read()
|
|
correct_pw_hash = open('level3.hash.bin', 'rb').read()
|
|
|
|
|
|
def hash_pw(pw_str):
|
|
pw_bytes = bytearray()
|
|
pw_bytes.extend(pw_str.encode())
|
|
m = hashlib.md5()
|
|
m.update(pw_bytes)
|
|
return m.digest()
|
|
|
|
|
|
def level_3_pw_check():
|
|
user_pw = input("Please enter correct password for flag: ")
|
|
user_pw_hash = hash_pw(user_pw)
|
|
|
|
if( user_pw_hash == correct_pw_hash ):
|
|
print("Welcome back... your flag, user:")
|
|
decryption = str_xor(flag_enc.decode(), user_pw)
|
|
print(decryption)
|
|
return
|
|
print("That password is incorrect")
|
|
|
|
|
|
|
|
level_3_pw_check()
|
|
|
|
|
|
# The strings below are 7 possibilities for the correct password.
|
|
# (Only 1 is correct)
|
|
pos_pw_list = ["8799", "d3ab", "1ea2", "acaf", "2295", "a9de", "6f3d"]
|
|
|