2024-04-06 19:39:21 +00:00
# Trikovi za Crypto CTF-ove
< details >
< summary > < strong > Naučite hakovanje AWS-a od nule do heroja sa< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Red Team Expert)< / strong > < / a > < strong > !< / strong > < / summary >
2024-04-07 04:23:52 +00:00
Drugi načini podrške HackTricks-u:
2024-04-06 19:39:21 +00:00
2024-04-07 04:23:52 +00:00
* Ako želite da vidite **vašu kompaniju reklamiranu na HackTricks-u** ili **preuzmete HackTricks u PDF formatu** proverite [**PLANOVE ZA PRIJAVU** ](https://github.com/sponsors/carlospolop )!
2024-04-06 19:39:21 +00:00
* Nabavite [**zvanični PEASS & HackTricks swag** ](https://peass.creator-spring.com )
* Otkrijte [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ), našu kolekciju ekskluzivnih [**NFT-ova** ](https://opensea.io/collection/the-peass-family )
2024-04-07 04:23:52 +00:00
* **Pridružite se** 💬 [**Discord grupi** ](https://discord.gg/hRep4RUj7f ) ili [**telegram grupi** ](https://t.me/peass ) ili nas **pratite** na **Twitteru** 🐦 [**@hacktricks_live** ](https://twitter.com/hacktricks_live )**.**
* **Podelite svoje hakovanje trikova slanjem PR-ova na** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) i [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github repozitorijume.
2024-04-06 19:39:21 +00:00
< / details >
## Online baze heševa
* _**Pretražite na Google-u**_
* [http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240 ](http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240 )
* [https://www.onlinehashcrack.com/ ](https://www.onlinehashcrack.com )
* [https://crackstation.net/ ](https://crackstation.net )
* [https://md5decrypt.net/ ](https://md5decrypt.net )
* [https://www.onlinehashcrack.com ](https://www.onlinehashcrack.com )
* [https://gpuhash.me/ ](https://gpuhash.me )
* [https://hashes.org/search.php ](https://hashes.org/search.php )
* [https://www.cmd5.org/ ](https://www.cmd5.org )
* [https://hashkiller.co.uk/Cracker/MD5 ](https://hashkiller.co.uk/Cracker/MD5 )
* [https://www.md5online.org/md5-decrypt.html ](https://www.md5online.org/md5-decrypt.html )
2024-04-07 04:23:52 +00:00
## Magični automatski rešavači
2024-04-06 19:39:21 +00:00
* [**https://github.com/Ciphey/Ciphey** ](https://github.com/Ciphey/Ciphey )
2024-04-07 04:23:52 +00:00
* [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ ) (Magični modul)
2024-04-06 19:39:21 +00:00
* [https://github.com/dhondta/python-codext ](https://github.com/dhondta/python-codext )
* [https://www.boxentriq.com/code-breaking ](https://www.boxentriq.com/code-breaking )
## Enkoderi
2024-04-07 04:23:52 +00:00
Većina enkodiranih podataka može se dekodirati sa ovim 2 resursa:
2024-04-06 19:39:21 +00:00
* [https://www.dcode.fr/tools-list ](https://www.dcode.fr/tools-list )
* [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ )
2024-04-07 04:23:52 +00:00
### Substitucioni automatski rešavači
2024-04-06 19:39:21 +00:00
* [https://www.boxentriq.com/code-breaking/cryptogram ](https://www.boxentriq.com/code-breaking/cryptogram )
2024-04-07 04:23:52 +00:00
* [https://quipqiup.com/ ](https://quipqiup.com ) - Veoma dobro !
2024-04-06 19:39:21 +00:00
#### Cezar - ROTx automatski rešavači
* [https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript ](https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript )
#### Atbash šifra
* [http://rumkin.com/tools/cipher/atbash.php ](http://rumkin.com/tools/cipher/atbash.php )
2024-04-07 04:23:52 +00:00
### Automatski rešavači za osnovne enkodiranja
2024-04-06 19:39:21 +00:00
Proverite sve ove baze sa: [https://github.com/dhondta/python-codext ](https://github.com/dhondta/python-codext )
* `DmPsv8J7qrlKEoY7`
* **MEGAN35** \[_3G-Ub=c-pW-Z/12+406-9Vaq-zA-F5_]
* `kLD8iwKsigSalLJ5`
* **ZONG22** \[_ZKj9n+yf0wDVX1s/5YbdxSo=ILaUpPBCHg8uvNO4klm6iJGhQ7eFrWczAMEq3RTt2_]
* `ayRiIo1gpO+uUc7g`
* **ESAB46** \[]
* `3sHcL2NR8WrT7mhR`
* **MEGAN45** \[]
* `kLD8igSXm2KZlwrX`
* **TIGO3FX** \[]
* `7AP9mIzdmltYmIP9mWXX`
* **TRIPO5** \[]
* `UE9vSbnBW6psVzxB`
* **FERON74** \[]
* `PbGkNudxCzaKBm0x`
* **GILA7** \[]
* `D+nkv8C1qIKMErY1`
* **Citrix CTX1** \[]
* `MNGIKCAHMOGLKPAKMMGJKNAINPHKLOBLNNHILCBHNOHLLPBK`
[http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html ](http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html ) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html )
### HackerizeXS \[_╫Λ↻├☰┏_]
```
╫☐↑Λ↻Λ┏Λ↻☐↑Λ
```
2024-04-07 04:23:52 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ) - 404 Mrtav: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html )
2024-04-06 19:39:21 +00:00
### Morse
```
.... --- .-.. -.-. .- .-. .- -.-. --- .-.. .-
```
2024-04-07 04:23:52 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html ](http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html ) - 404 Mrtav: [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ )
2024-04-06 19:39:21 +00:00
### UUencoder
```
begin 644 webutils_pl
M2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(
M3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/
F3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$$`
`
end
```
* [http://www.webutils.pl/index.php?idx=uu ](http://www.webutils.pl/index.php?idx=uu )
2024-04-07 04:23:52 +00:00
### XXEnkoder
2024-04-06 19:39:21 +00:00
```
begin 644 webutils_pl
hG2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236
5Hol-G2xAEE++
end
```
* [www.webutils.pl/index.php?idx=xx ](https://github.com/carlospolop/hacktricks/tree/bf578e4c5a955b4f6cdbe67eb4a543e16a3f848d/crypto/www.webutils.pl/index.php?idx=xx )
### YEncoder
```
=ybegin line=128 size=28 name=webutils_pl
ryvkryvkryvkryvkryvkryvkryvk
=yend size=28 crc32=35834c86
```
* [http://www.webutils.pl/index.php?idx=yenc ](http://www.webutils.pl/index.php?idx=yenc )
### BinHex
```
(This file must be converted with BinHex 4.0)
:#hGPBR9dD@acAh"X!$mr2cmr2cmr!!!!!!!8!!!!!-ka5%p-38K26%& )6da"5%p
-38K26%'d9J!!:
```
* [http://www.webutils.pl/index.php?idx=binhex ](http://www.webutils.pl/index.php?idx=binhex )
### ASCII85
```
< ~85DoF85DoF85DoF85DoF85DoF85DoF~>
```
* [http://www.webutils.pl/index.php?idx=ascii85 ](http://www.webutils.pl/index.php?idx=ascii85 )
### Dvorak tastatura
```
drnajapajrna
```
* [https://www.geocachingtoolbox.com/index.php?lang=sr\&page=dvorakKeyboard ](https://www.geocachingtoolbox.com/index.php?lang=sr\&page=dvorakKeyboard )
### A1Z26
2024-04-07 04:23:52 +00:00
Slova njihova numerička vrednost
2024-04-06 19:39:21 +00:00
```
8 15 12 1 3 1 18 1 3 15 12 1
```
2024-04-07 04:23:52 +00:00
### Afina Šifra Kodiranje
2024-04-06 19:39:21 +00:00
2024-04-07 04:23:52 +00:00
Pretvori slovo u broj `(ax+b)%26` (_a_ i _b_ su ključevi, a _x_ je slovo) i rezultat ponovo u slovo
2024-04-06 19:39:21 +00:00
```
krodfdudfrod
```
### SMS Kod
2024-04-07 04:23:52 +00:00
**Multitap** [zamenjuje slovo ](https://www.dcode.fr/word-letter-change ) ponovljenim brojevima definisanim odgovarajućim kodom tastera na mobilnom [telefonskom tastaturi ](https://www.dcode.fr/phone-keypad-cipher ) (Ovaj režim se koristi prilikom pisanja SMS poruka).\
2024-04-06 19:39:21 +00:00
Na primer: 2=A, 22=B, 222=C, 3=D...\
Možete prepoznati ovaj kod jer ćete videti\*\* više puta ponovljene brojeve\*\*.
Ovaj kod možete dekodirati na: [https://www.dcode.fr/multitap-abc-cipher ](https://www.dcode.fr/multitap-abc-cipher )
### Bacon Kod
2024-04-07 04:23:52 +00:00
Zamenite svako slovo sa 4 A-ja ili B-a (ili 1 i 0)
2024-04-06 19:39:21 +00:00
```
00111 01101 01010 00000 00010 00000 10000 00000 00010 01101 01010 00000
AABBB ABBAB ABABA AAAAA AAABA AAAAA BAAAA AAAAA AAABA ABBAB ABABA AAAAA
```
### Runovi
![](../.gitbook/assets/runes.jpg)
## Kompresija
2024-04-07 04:23:52 +00:00
**Sirovi Deflate** i **Sirovi Inflate** (možete pronaći oba u Cyberchef-u) mogu kompresovati i dekompresovati podatke bez zaglavlja.
2024-04-06 19:39:21 +00:00
## Jednostavna Kriptografija
2024-04-07 04:23:52 +00:00
### XOR - Automatsko rešenje
2024-04-06 19:39:21 +00:00
* [https://wiremask.eu/tools/xor-cracker/ ](https://wiremask.eu/tools/xor-cracker/ )
### Bifid
Potreban je ključna reč
```
fgaargaamnlunesuneoa
```
### Vigenere
2024-04-07 04:23:52 +00:00
Potreban je ključ
2024-04-06 19:39:21 +00:00
```
wodsyoidrods
```
* [https://www.guballa.de/vigenere-solver ](https://www.guballa.de/vigenere-solver )
* [https://www.dcode.fr/vigenere-cipher ](https://www.dcode.fr/vigenere-cipher )
* [https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx ](https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx )
2024-04-07 04:23:52 +00:00
## Jaka Kriptografija
2024-04-06 19:39:21 +00:00
### Fernet
2 base64 stringa (token i ključ)
```
Token:
gAAAAABWC9P7-9RsxTz_dwxh9-O2VUB7Ih8UCQL1_Zk4suxnkCvb26Ie4i8HSUJ4caHZuiNtjLl3qfmCv_fS3_VpjL7HxCz7_Q==
Key:
-s6eI5hyNh8liH7Gq0urPC-vzPgNnxauKvRO4g03oYI=
```
* [https://asecuritysite.com/encryption/ferdecode ](https://asecuritysite.com/encryption/ferdecode )
2024-04-07 04:23:52 +00:00
### Samir Deljenje tajni
2024-04-06 19:39:21 +00:00
2024-04-07 04:23:52 +00:00
Tajna je podeljena na X delova i da biste je vratili, potrebno vam je Y delova (_Y < =X_).
2024-04-06 19:39:21 +00:00
```
8019f8fa5879aa3e07858d08308dc1a8b45
80223035713295bddf0b0bd1b10a5340b89
803bc8cf294b3f83d88e86d9818792e80cd
```
[http://christian.gen.co/secrets/ ](http://christian.gen.co/secrets/ )
### OpenSSL brute-force
* [https://github.com/glv2/bruteforce-salted-openssl ](https://github.com/glv2/bruteforce-salted-openssl )
* [https://github.com/carlospolop/easy\_BFopensslCTF ](https://github.com/carlospolop/easy\_BFopensslCTF )
## Alati
* [https://github.com/Ganapati/RsaCtfTool ](https://github.com/Ganapati/RsaCtfTool )
* [https://github.com/lockedbyte/cryptovenom ](https://github.com/lockedbyte/cryptovenom )
* [https://github.com/nccgroup/featherduster ](https://github.com/nccgroup/featherduster )
< details >
< summary > < strong > Naučite hakovanje AWS-a od nule do heroja sa< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Red Team Expert)< / strong > < / a > < strong > !< / strong > < / summary >
Drugi načini podrške HackTricks-u:
2024-04-07 04:23:52 +00:00
* Ako želite da vidite **vašu kompaniju reklamiranu na HackTricks-u** ili **preuzmete HackTricks u PDF formatu** proverite [**PLANOVE ZA PRIJAVU** ](https://github.com/sponsors/carlospolop )!
2024-04-06 19:39:21 +00:00
* Nabavite [**zvanični PEASS & HackTricks swag** ](https://peass.creator-spring.com )
* Otkrijte [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ), našu kolekciju ekskluzivnih [**NFT-ova** ](https://opensea.io/collection/the-peass-family )
2024-04-07 04:23:52 +00:00
* **Pridružite se** 💬 [**Discord grupi** ](https://discord.gg/hRep4RUj7f ) ili [**telegram grupi** ](https://t.me/peass ) ili nas **pratite** na **Twitteru** 🐦 [**@hacktricks_live** ](https://twitter.com/hacktricks_live )**.**
* **Podelite svoje hakovanje trikova slanjem PR-ova na** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) i [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github repozitorijume.
2024-04-06 19:39:21 +00:00
< / details >