<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="http://wiki.zenk-security.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://wiki.zenk-security.com/feed.php">
        <title>Zenk - Security ndh2k12_public:crypto</title>
        <description></description>
        <link>http://wiki.zenk-security.com/</link>
        <image rdf:resource="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico" />
       <dc:date>2026-04-27T06:38:28+02:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:rsa&amp;rev=1341180881&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:s4nch0_4&amp;rev=1491744837&amp;do=diff"/>
                <rdf:li rdf:resource="http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:warcrypt&amp;rev=1491744837&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico">
        <title>Zenk - Security</title>
        <link>http://wiki.zenk-security.com/</link>
        <url>http://wiki.zenk-security.com/lib/tpl/dokuwiki/images/favicon.ico</url>
    </image>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:rsa&amp;rev=1341180881&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-07-02T00:14:41+02:00</dc:date>
        <title>ndh2k12_public:crypto:rsa</title>
        <link>http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:rsa&amp;rev=1341180881&amp;do=diff</link>
        <description>Principe du chall
While sniffing HZV network, you just caught an encrypted message for John. Might contain interesting stuff.
Après détarrage du .tar, on se retrouve avec 4 fichiers et un dossier :


% tar xvf rsa.tar
librsa/
librsa/__init__.pyc
librsa/__init__.py
decrypt.py
flag.asc
john.pub
README
% cat flag.asc
----- BEGIN MESSAGE -----
eJw1krt1HUEMQ3NVosiHIMFfD68J5wrcf2TM7Crce0gQwOz3zz98fRCgkT5DEjWfr7+fjU6rxWA2
3A+CO6NsTN9cuygYHWRsrTHzMG/mTld1Gwd3DB5M93SaC98DgslEc3zuIrgENlZkgwd12HDHNPkr
JaMd…</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:s4nch0_4&amp;rev=1491744837&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-04-09T15:33:57+02:00</dc:date>
        <title>ndh2k12_public:crypto:s4nch0_4</title>
        <link>http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:s4nch0_4&amp;rev=1491744837&amp;do=diff</link>
        <description>Overview

Pour ce challenge on avait un indice “Resistance is futile” et un fichier tar dont le contenu était un fichier nommé “colors”. En éditant le fichier avec un éditeur de texte on découvrait le contenu suivant : 


 [Noir Violet Violet]---[Marron Marron Violet]---[Marron Marron Jaune]---
 [Marron Marron Rouge]---[Marron Noir Jaune]---[Marron Rouge Marron]---
 [Noir Orange Blanc]---[Marron Marron Vert]---[Noir Orange Rouge]---
 [Marron Noir Gris]---[Noir Blanc Violet]---[Marron Marron Blan…</description>
    </item>
    <item rdf:about="http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:warcrypt&amp;rev=1491744837&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-04-09T15:33:57+02:00</dc:date>
        <title>ndh2k12_public:crypto:warcrypt</title>
        <link>http://wiki.zenk-security.com/doku.php?id=ndh2k12_public:crypto:warcrypt&amp;rev=1491744837&amp;do=diff</link>
        <description>Overview

On a accès à une page web. Il faut jouer contre un bot qui visiblement cheat. 



Résolution

On se rend vite compte que la vérification de qui gagne se fait par une requête ajax.


function send() {
	var ajax = $.ajax({
		type: &quot;POST&quot;,
		url: &quot;ajax/send.php&quot;,
		data: &quot;card=&quot;+$('.card:last').attr(&quot;alt&quot;)+&quot;&amp;sign=&quot;+$('.card:last').attr(&quot;id&quot;)
	});
	ajax.done(function(rep) {
		$('.card &gt; img:last').remove();
		var json = eval('(' + rep +')'); 
		$('#score').html('Score : ' + json.score);
		…</description>
    </item>
</rdf:RDF>
