PicoCTF2022 - credstuff
Description
We found a leak of a blackmarket website's login credentials. Can you find the password of the user cultiris and successfully decrypt it? Download the leak here. The first user in usernames.txt corresponds to the first password in passwords.txt. The second user corresponds to the second password, and so on.
Information
Point Value: 100 points
Category: Cryptography
Hints
- Maybe other passwords will have hints about the leak?
Solution
We use the command grep -n -r "cultiris" .
to find the line number in which the username
"cultiris" appears.
jackwin@COMPUTER ~ % grep -n -r "cultiris" .
We find the username to be on line 378 of usernames.txt, meaning the password
on line 378 of passwords.txt corresponds to cultiris's password. We find the
string "cvpbPGS{P7e1S_54I35_71Z3}" on line 378, which seems to be encoded with a cipher. After trying a couple
of different ciphers out, we realize that it is encoded using a ROT13 cipher, so using the command
./usernames.txt:378:cultiris
echo 'cvpbPGS{P7e1S_54I35_71Z3}' | tr 'A-Za-z' 'N-ZA-Mn-za-m'
gives us the flag.
jackwin@COMPUTER ~ % echo 'cvpbPGS{P7e1S_54I35_71Z3}' | tr 'A-Za-z' 'N-ZA-Mn-za-m'
We can also use CyberChef to decode and the "ROT13 Brute Force" recipe and
"picoCTF" in the crib (known plaintext string), which shows the flag is rotated by 13 and gives us the flag too.
picoCTF{C7r1F_54V35_71M3}