2024-02-10 21:30:13 +00:00
# Crypto CTFs 트릭
2022-04-28 16:01:33 +00:00
2024-07-18 18:39:08 +00:00
{% hint style="success" %}
AWS 해킹 학습 및 실습:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
GCP 해킹 학습 및 실습: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Training GCP Red Team Expert (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
2024-07-18 18:39:08 +00:00
< details >
2022-04-28 16:01:33 +00:00
2024-07-18 18:39:08 +00:00
< summary > HackTricks 지원< / summary >
2022-04-28 16:01:33 +00:00
2024-07-18 18:39:08 +00:00
* [**구독 요금제** ](https://github.com/sponsors/carlospolop )를 확인하세요!
* 💬 [**Discord 그룹** ](https://discord.gg/hRep4RUj7f ) 또는 [**텔레그램 그룹** ](https://t.me/peass )에 **참여**하거나 **트위터** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**를 팔로우**하세요.
* [**HackTricks** ](https://github.com/carlospolop/hacktricks ) 및 [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) 깃허브 저장소에 PR을 제출하여 해킹 트릭을 공유하세요.
2022-04-28 16:01:33 +00:00
< / details >
2024-07-18 18:39:08 +00:00
{% endhint %}
2022-04-28 16:01:33 +00:00
2024-02-10 21:30:13 +00:00
## 온라인 해시 DB
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
* _**구글에서 찾아보세요**_
2021-08-30 22:36:25 +00:00
* [http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240 ](http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240 )
2021-10-18 11:21:18 +00:00
* [https://www.onlinehashcrack.com/ ](https://www.onlinehashcrack.com )
* [https://crackstation.net/ ](https://crackstation.net )
* [https://md5decrypt.net/ ](https://md5decrypt.net )
2021-08-30 22:36:25 +00:00
* [https://www.onlinehashcrack.com ](https://www.onlinehashcrack.com )
2021-10-18 11:21:18 +00:00
* [https://gpuhash.me/ ](https://gpuhash.me )
2021-08-30 22:36:25 +00:00
* [https://hashes.org/search.php ](https://hashes.org/search.php )
2021-10-18 11:21:18 +00:00
* [https://www.cmd5.org/ ](https://www.cmd5.org )
2021-08-30 22:36:25 +00:00
* [https://hashkiller.co.uk/Cracker/MD5 ](https://hashkiller.co.uk/Cracker/MD5 )
* [https://www.md5online.org/md5-decrypt.html ](https://www.md5online.org/md5-decrypt.html )
2021-09-22 10:45:02 +00:00
2024-07-18 18:39:08 +00:00
## 매직 자동 해독기
2021-09-22 10:45:02 +00:00
2022-04-05 22:24:52 +00:00
* [**https://github.com/Ciphey/Ciphey** ](https://github.com/Ciphey/Ciphey )
2024-07-18 18:39:08 +00:00
* [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ ) (매직 모듈)
2022-04-05 22:24:52 +00:00
* [https://github.com/dhondta/python-codext ](https://github.com/dhondta/python-codext )
2022-07-05 17:49:17 +00:00
* [https://www.boxentriq.com/code-breaking ](https://www.boxentriq.com/code-breaking )
2021-08-30 22:36:25 +00:00
2024-02-10 21:30:13 +00:00
## 인코더
2021-08-30 22:36:25 +00:00
2024-02-10 21:30:13 +00:00
대부분의 인코딩된 데이터는 다음 2개의 자원을 사용하여 디코딩할 수 있습니다:
2021-08-30 22:36:25 +00:00
* [https://www.dcode.fr/tools-list ](https://www.dcode.fr/tools-list )
* [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ )
2024-07-18 18:39:08 +00:00
### 치환 자동 해독기
2021-08-30 22:36:25 +00:00
* [https://www.boxentriq.com/code-breaking/cryptogram ](https://www.boxentriq.com/code-breaking/cryptogram )
2024-02-10 21:30:13 +00:00
* [https://quipqiup.com/ ](https://quipqiup.com ) - 매우 좋음!
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
#### 시저 - ROTx 자동 해독기
2021-08-30 22:36:25 +00:00
* [https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript ](https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript )
2024-07-18 18:39:08 +00:00
#### 앗바쉬 암호
2021-08-30 22:36:25 +00:00
* [http://rumkin.com/tools/cipher/atbash.php ](http://rumkin.com/tools/cipher/atbash.php )
2024-07-18 18:39:08 +00:00
### 기본 인코딩 자동 해독기
다음을 사용하여 모든 이러한 기본을 확인하세요: [https://github.com/dhondta/python-codext ](https://github.com/dhondta/python-codext )
* **HAZZ15** \[_HNO4klm6ij9n+J2hyf0gzA8uvwDEq3X1Q7ZKeFrWcVTts/MRGYbdxSo=ILaUpPBC5_]
2024-02-10 21:30:13 +00:00
* `DmPsv8J7qrlKEoY7`
2022-02-05 13:50:50 +00:00
* **MEGAN35** \[_3G-Ub=c-pW-Z/12+406-9Vaq-zA-F5_]
2024-02-10 21:30:13 +00:00
* `kLD8iwKsigSalLJ5`
2021-10-18 11:21:18 +00:00
* **ZONG22** \[_ZKj9n+yf0wDVX1s/5YbdxSo=ILaUpPBCHg8uvNO4klm6iJGhQ7eFrWczAMEq3RTt2_]
2024-02-10 21:30:13 +00:00
* `ayRiIo1gpO+uUc7g`
2021-10-18 11:21:18 +00:00
* **ESAB46** \[]
2024-02-10 21:30:13 +00:00
* `3sHcL2NR8WrT7mhR`
2021-10-18 11:21:18 +00:00
* **MEGAN45** \[]
2024-02-10 21:30:13 +00:00
* `kLD8igSXm2KZlwrX`
2021-10-18 11:21:18 +00:00
* **TIGO3FX** \[]
2024-02-10 21:30:13 +00:00
* `7AP9mIzdmltYmIP9mWXX`
2021-10-18 11:21:18 +00:00
* **TRIPO5** \[]
2024-02-10 21:30:13 +00:00
* `UE9vSbnBW6psVzxB`
2021-10-18 11:21:18 +00:00
* **FERON74** \[]
2024-02-10 21:30:13 +00:00
* `PbGkNudxCzaKBm0x`
2021-10-18 11:21:18 +00:00
* **GILA7** \[]
2024-02-10 21:30:13 +00:00
* `D+nkv8C1qIKMErY1`
2021-10-18 11:21:18 +00:00
* **Citrix CTX1** \[]
2024-02-10 21:30:13 +00:00
* `MNGIKCAHMOGLKPAKMMGJKNAINPHKLOBLNNHILCBHNOHLLPBK`
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
[http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html ](http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html ) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html )
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### HackerizeXS \[_╫Λ↻├☰┏_]
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
╫☐↑Λ↻Λ┏Λ↻☐↑Λ
```
2022-07-05 17:49:17 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html )
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
### 모스부호
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
.... --- .-.. -.-. .- .-. .- -.-. --- .-.. .-
```
2022-07-05 17:49:17 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html ](http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html ) - 404 Dead: [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ )
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### UUencoder
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
begin 644 webutils_pl
M2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(
M3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/
F3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$$`
`
end
```
* [http://www.webutils.pl/index.php?idx=uu ](http://www.webutils.pl/index.php?idx=uu )
2024-07-18 18:39:08 +00:00
### XX인코더
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
begin 644 webutils_pl
hG2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236
5Hol-G2xAEE++
end
```
* [www.webutils.pl/index.php?idx=xx ](https://github.com/carlospolop/hacktricks/tree/bf578e4c5a955b4f6cdbe67eb4a543e16a3f848d/crypto/www.webutils.pl/index.php?idx=xx )
2024-02-10 21:30:13 +00:00
### YEncoder
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
=ybegin line=128 size=28 name=webutils_pl
ryvkryvkryvkryvkryvkryvkryvk
=yend size=28 crc32=35834c86
```
* [http://www.webutils.pl/index.php?idx=yenc ](http://www.webutils.pl/index.php?idx=yenc )
2022-07-05 17:49:17 +00:00
### BinHex
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
(This file must be converted with BinHex 4.0)
:#hGPBR9dD@acAh"X!$mr2cmr2cmr!!!!!!!8!!!!!-ka5%p-38K26%& )6da"5%p
-38K26%'d9J!!:
```
* [http://www.webutils.pl/index.php?idx=binhex ](http://www.webutils.pl/index.php?idx=binhex )
2022-07-05 17:49:17 +00:00
### ASCII85
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
< ~85DoF85DoF85DoF85DoF85DoF85DoF~>
```
* [http://www.webutils.pl/index.php?idx=ascii85 ](http://www.webutils.pl/index.php?idx=ascii85 )
2024-02-10 21:30:13 +00:00
### Dvorak 키보드
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
drnajapajrna
```
2021-10-18 11:21:18 +00:00
* [https://www.geocachingtoolbox.com/index.php?lang=en\&page=dvorakKeyboard ](https://www.geocachingtoolbox.com/index.php?lang=en\&page=dvorakKeyboard )
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### A1Z26
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
글자를 숫자 값으로 변환
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
8 15 12 1 3 1 18 1 3 15 12 1
```
2024-07-18 18:39:08 +00:00
### Affine Cipher Encode
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
알파벳을 숫자로 변환하여 `(ax+b)%26` (_a_ 와 _b_ 가 키이고 _x_ 가 알파벳) 계산하고 결과를 다시 알파벳으로 변환합니다.
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
krodfdudfrod
```
2024-02-10 21:30:13 +00:00
### SMS 코드
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
**멀티탭**은 모바일 [전화 키패드 ](https://www.dcode.fr/phone-keypad-cipher )에서 해당 키 코드에 의해 정의된 반복된 숫자로 문자를 대체합니다 (이 모드는 SMS 작성 시 사용됨).\
2024-02-10 21:30:13 +00:00
예를 들어: 2=A, 22=B, 222=C, 3=D...\
2024-07-18 18:39:08 +00:00
여러 번 반복된 숫자를 볼 수 있기 때문에 이 코드를 식별할 수 있습니다.
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
이 코드를 해독할 수 있습니다: [https://www.dcode.fr/multitap-abc-cipher ](https://www.dcode.fr/multitap-abc-cipher )
2021-08-30 22:36:25 +00:00
2024-02-10 21:30:13 +00:00
### 베이컨 코드
2021-08-30 22:36:25 +00:00
2024-02-10 21:30:13 +00:00
각 문자를 4개의 A 또는 B (또는 1과 0)로 대체합니다.
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
00111 01101 01010 00000 00010 00000 10000 00000 00010 01101 01010 00000
AABBB ABBAB ABABA AAAAA AAABA AAAAA BAAAA AAAAA AAABA ABBAB ABABA AAAAA
```
2024-02-10 21:30:13 +00:00
### 룬
2021-08-30 22:36:25 +00:00
![](../.gitbook/assets/runes.jpg)
2024-02-10 21:30:13 +00:00
## 압축
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
**Raw Deflate** 및 **Raw Inflate** (둘 다 Cyberchef에서 찾을 수 있음)는 헤더 없이 데이터를 압축하고 해제할 수 있습니다.
2021-08-30 22:36:25 +00:00
2024-02-10 21:30:13 +00:00
## 쉬운 암호화
2021-08-30 22:36:25 +00:00
2024-02-10 21:30:13 +00:00
### XOR - 자동 해독기
2021-08-30 22:36:25 +00:00
* [https://wiremask.eu/tools/xor-cracker/ ](https://wiremask.eu/tools/xor-cracker/ )
2022-07-05 17:49:17 +00:00
### Bifid
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
키워드가 필요합니다
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
fgaargaamnlunesuneoa
```
2022-07-05 17:49:17 +00:00
### Vigenere
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
키워드가 필요합니다
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
wodsyoidrods
```
* [https://www.guballa.de/vigenere-solver ](https://www.guballa.de/vigenere-solver )
* [https://www.dcode.fr/vigenere-cipher ](https://www.dcode.fr/vigenere-cipher )
* [https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx ](https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx )
2024-02-10 21:30:13 +00:00
## 강력한 암호화
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### Fernet
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
2 개의 base64 문자열 (토큰 및 키)
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
Token:
gAAAAABWC9P7-9RsxTz_dwxh9-O2VUB7Ih8UCQL1_Zk4suxnkCvb26Ie4i8HSUJ4caHZuiNtjLl3qfmCv_fS3_VpjL7HxCz7_Q==
Key:
-s6eI5hyNh8liH7Gq0urPC-vzPgNnxauKvRO4g03oYI=
```
* [https://asecuritysite.com/encryption/ferdecode ](https://asecuritysite.com/encryption/ferdecode )
2022-07-05 17:49:17 +00:00
### Samir Secret Sharing
2021-08-30 22:36:25 +00:00
2024-07-18 18:39:08 +00:00
비밀은 X 부분으로 분할되며 복구하려면 Y 부분이 필요합니다 (_Y < =X_).
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
8019f8fa5879aa3e07858d08308dc1a8b45
80223035713295bddf0b0bd1b10a5340b89
803bc8cf294b3f83d88e86d9818792e80cd
```
[http://christian.gen.co/secrets/ ](http://christian.gen.co/secrets/ )
2024-07-18 18:39:08 +00:00
### OpenSSL 브루트 포스
2021-08-30 22:36:25 +00:00
* [https://github.com/glv2/bruteforce-salted-openssl ](https://github.com/glv2/bruteforce-salted-openssl )
2022-07-05 17:49:17 +00:00
* [https://github.com/carlospolop/easy\_BFopensslCTF ](https://github.com/carlospolop/easy\_BFopensslCTF )
2021-08-30 22:36:25 +00:00
2024-02-10 21:30:13 +00:00
## 도구
2021-08-30 22:36:25 +00:00
* [https://github.com/Ganapati/RsaCtfTool ](https://github.com/Ganapati/RsaCtfTool )
* [https://github.com/lockedbyte/cryptovenom ](https://github.com/lockedbyte/cryptovenom )
* [https://github.com/nccgroup/featherduster ](https://github.com/nccgroup/featherduster )
2022-04-28 16:01:33 +00:00
2024-07-18 18:39:08 +00:00
{% hint style="success" %}
AWS 해킹 학습 및 실습:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
GCP 해킹 학습 및 실습: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Training GCP Red Team Expert (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
2024-07-18 18:39:08 +00:00
< details >
2022-04-28 16:01:33 +00:00
2024-07-18 18:39:08 +00:00
< summary > HackTricks 지원< / summary >
2022-04-28 16:01:33 +00:00
2024-07-18 18:39:08 +00:00
* [**구독 요금제** ](https://github.com/sponsors/carlospolop )를 확인하세요!
* 💬 [**디스코드 그룹** ](https://discord.gg/hRep4RUj7f ) 또는 [**텔레그램 그룹** ](https://t.me/peass )에 **참여**하거나 **트위터** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**를 팔로우**하세요.
* **HackTricks** 및 **HackTricks Cloud** 깃허브 저장소에 PR을 제출하여 해킹 트릭을 공유하세요.
2022-04-28 16:01:33 +00:00
< / details >
2024-07-18 18:39:08 +00:00
{% endhint %}