2024-02-11 02:13:58 +00:00
# Mbinu za Crypto CTFs
2022-04-28 16:01:33 +00:00
< details >
2024-02-11 02:13:58 +00:00
< summary > < strong > Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Red Team Expert)< / strong > < / a > < strong > !< / strong > < / summary >
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MPANGO WA KUJIUNGA** ](https://github.com/sponsors/carlospolop )!
* Pata [**swag rasmi ya PEASS & HackTricks** ](https://peass.creator-spring.com )
* Gundua [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ), mkusanyiko wetu wa kipekee wa [**NFTs** ](https://opensea.io/collection/the-peass-family )
* **Jiunge na** 💬 [**Kikundi cha Discord** ](https://discord.gg/hRep4RUj7f ) au [**kikundi cha telegram** ](https://t.me/peass ) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks_live** ](https://twitter.com/hacktricks_live )**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PR kwa** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) na [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) repos za github.
2022-04-28 16:01:33 +00:00
< / details >
2022-07-05 17:49:17 +00:00
## Online Hashes DBs
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
* _**Tafuta kwenye Google**_
2021-08-30 22:36:25 +00:00
* [http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240 ](http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240 )
2021-10-18 11:21:18 +00:00
* [https://www.onlinehashcrack.com/ ](https://www.onlinehashcrack.com )
* [https://crackstation.net/ ](https://crackstation.net )
* [https://md5decrypt.net/ ](https://md5decrypt.net )
2021-08-30 22:36:25 +00:00
* [https://www.onlinehashcrack.com ](https://www.onlinehashcrack.com )
2021-10-18 11:21:18 +00:00
* [https://gpuhash.me/ ](https://gpuhash.me )
2021-08-30 22:36:25 +00:00
* [https://hashes.org/search.php ](https://hashes.org/search.php )
2021-10-18 11:21:18 +00:00
* [https://www.cmd5.org/ ](https://www.cmd5.org )
2021-08-30 22:36:25 +00:00
* [https://hashkiller.co.uk/Cracker/MD5 ](https://hashkiller.co.uk/Cracker/MD5 )
* [https://www.md5online.org/md5-decrypt.html ](https://www.md5online.org/md5-decrypt.html )
2021-09-22 10:45:02 +00:00
2022-07-05 17:49:17 +00:00
## Magic Autosolvers
2021-09-22 10:45:02 +00:00
2022-04-05 22:24:52 +00:00
* [**https://github.com/Ciphey/Ciphey** ](https://github.com/Ciphey/Ciphey )
2024-02-11 02:13:58 +00:00
* [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ ) (Moduli ya Magic)
2022-04-05 22:24:52 +00:00
* [https://github.com/dhondta/python-codext ](https://github.com/dhondta/python-codext )
2022-07-05 17:49:17 +00:00
* [https://www.boxentriq.com/code-breaking ](https://www.boxentriq.com/code-breaking )
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
## Encoders
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Kwa kawaida, data iliyofichwa inaweza kubadilishwa na rasilimali hizi 2:
2021-08-30 22:36:25 +00:00
* [https://www.dcode.fr/tools-list ](https://www.dcode.fr/tools-list )
* [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ )
2022-07-05 17:49:17 +00:00
### Substitution Autosolvers
2021-08-30 22:36:25 +00:00
* [https://www.boxentriq.com/code-breaking/cryptogram ](https://www.boxentriq.com/code-breaking/cryptogram )
2024-02-11 02:13:58 +00:00
* [https://quipqiup.com/ ](https://quipqiup.com ) - Nzuri sana!
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
#### Caesar - ROTx Autosolvers
2021-08-30 22:36:25 +00:00
* [https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript ](https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript )
2022-07-05 17:49:17 +00:00
#### Atbash Cipher
2021-08-30 22:36:25 +00:00
* [http://rumkin.com/tools/cipher/atbash.php ](http://rumkin.com/tools/cipher/atbash.php )
2022-07-05 17:49:17 +00:00
### Base Encodings Autosolver
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Angalia misingi yote hii na: [https://github.com/dhondta/python-codext ](https://github.com/dhondta/python-codext )
2021-08-30 22:36:25 +00:00
2022-02-05 13:50:50 +00:00
* **Ascii85**
2024-02-11 02:13:58 +00:00
* `BQ%]q@psCd@rH0l`
2022-02-05 13:50:50 +00:00
* **Base26** \[_A-Z_]
2024-02-11 02:13:58 +00:00
* `BQEKGAHRJKHQMVZGKUXNT`
2021-10-18 11:21:18 +00:00
* **Base32** \[_A-Z2-7=_]
2024-02-11 02:13:58 +00:00
* `NBXWYYLDMFZGCY3PNRQQ====`
2022-02-05 13:50:50 +00:00
* **Zbase32** \[_ybndrfg8ejkmcpqxot1uwisza345h769_]
2024-02-11 02:13:58 +00:00
* `pbzsaamdcf3gna5xptoo====`
2022-02-05 13:50:50 +00:00
* **Base32 Geohash** \[_0-9b-hjkmnp-z_]
2024-02-11 02:13:58 +00:00
* `e1rqssc3d5t62svgejhh====`
2022-02-05 13:50:50 +00:00
* **Base32 Crockford** \[_0-9A-HJKMNP-TV-Z_]
2024-02-11 02:13:58 +00:00
* `D1QPRRB3C5S62RVFDHGG====`
2022-02-05 13:50:50 +00:00
* **Base32 Extended Hexadecimal** \[_0-9A-V_]
2024-02-11 02:13:58 +00:00
* `D1NMOOB3C5P62ORFDHGG====`
2022-07-05 17:49:17 +00:00
* **Base45** \[_0-9A-Z $%\*+-./:_]
2024-02-11 02:13:58 +00:00
* `59DPVDGPCVKEUPCPVD`
2022-02-05 13:50:50 +00:00
* **Base58 (bitcoin)** \[_1-9A-HJ-NP-Za-km-z_]
2024-02-11 02:13:58 +00:00
* `2yJiRg5BF9gmsU6AC`
2022-02-05 13:50:50 +00:00
* **Base58 (flickr)** \[_1-9a-km-zA-HJ-NP-Z_]
2024-02-11 02:13:58 +00:00
* `2YiHqF5bf9FLSt6ac`
2022-02-05 13:50:50 +00:00
* **Base58 (ripple)** \[_rpshnaf39wBUDNEGHJKLM4PQ-T7V-Z2b-eCg65jkm8oFqi1tuvAxyz_]
2024-02-11 02:13:58 +00:00
* `pyJ5RgnBE9gm17awU`
2021-10-18 11:21:18 +00:00
* **Base62** \[_0-9A-Za-z_]
2024-02-11 02:13:58 +00:00
* `g2AextRZpBKRBzQ9`
2021-10-18 11:21:18 +00:00
* **Base64** \[_A-Za-z0-9+/=_]
2024-02-11 02:13:58 +00:00
* `aG9sYWNhcmFjb2xh`
2022-07-05 17:49:17 +00:00
* **Base67** \[_A-Za-z0-9-_.!\~\_]
2024-02-11 02:13:58 +00:00
* `NI9JKX0cSUdqhr!p`
2022-07-05 17:49:17 +00:00
* **Base85 (Ascii85)** \[_!"#$%&'() \*+,-./0-9:; < =>?@A-Z\[\\]^\_\`a-u_]
2024-02-11 02:13:58 +00:00
* `BQ%]q@psCd@rH0l`
2022-07-05 17:49:17 +00:00
* **Base85 (Adobe)** \[_!"#$%&'() \*+,-./0-9:; < =>?@A-Z\[\\]^\_\`a-u_]
2024-02-11 02:13:58 +00:00
* `<~BQ%]q@psCd@rH0l~>`
2022-07-05 17:49:17 +00:00
* **Base85 (IPv6 or RFC1924)** \[_0-9A-Za-z!#$%&() \*+-; < =>?@^_\`{|}\~\_]
2024-02-11 02:13:58 +00:00
* `Xm4y` V\_|Y(V{dF>\`
2022-07-05 17:49:17 +00:00
* **Base85 (xbtoa)** \[_!"#$%&'() \*+,-./0-9:; < =>?@A-Z\[\\]^\_\`a-u_]
2024-02-11 02:13:58 +00:00
* `xbtoa Begin\nBQ%]q@psCd@rH0l\nxbtoa End N 12 c E 1a S 4e6 R 6991d`
2022-07-05 17:49:17 +00:00
* **Base85 (XML)** \[_0-9A-Za-y!#$()\*+,-./:;=?@^\`{|}\~z\__]
2024-02-11 02:13:58 +00:00
* `Xm4y|V{~Y+V}dF?`
2022-07-05 17:49:17 +00:00
* **Base91** \[_A-Za-z0-9!#$%&() \*+,./:; < =>?@\[]^\_\`{|}\~"_]
2024-02-11 02:13:58 +00:00
* `frDg[*jNN!7&BQM`
2022-02-05 13:50:50 +00:00
* **Base100** \[]
2024-02-11 02:13:58 +00:00
* `👟👦👣👘👚👘👩
* `DmPsv8J7qrlKEoY7`
2022-02-05 13:50:50 +00:00
* **MEGAN35** \[_3G-Ub=c-pW-Z/12+406-9Vaq-zA-F5_]
2024-02-11 02:13:58 +00:00
* `kLD8iwKsigSalLJ5`
2021-10-18 11:21:18 +00:00
* **ZONG22** \[_ZKj9n+yf0wDVX1s/5YbdxSo=ILaUpPBCHg8uvNO4klm6iJGhQ7eFrWczAMEq3RTt2_]
2024-02-11 02:13:58 +00:00
* `ayRiIo1gpO+uUc7g`
2021-10-18 11:21:18 +00:00
* **ESAB46** \[]
2024-02-11 02:13:58 +00:00
* `3sHcL2NR8WrT7mhR`
2021-10-18 11:21:18 +00:00
* **MEGAN45** \[]
2024-02-11 02:13:58 +00:00
* `kLD8igSXm2KZlwrX`
2021-10-18 11:21:18 +00:00
* **TIGO3FX** \[]
2024-02-11 02:13:58 +00:00
* `7AP9mIzdmltYmIP9mWXX`
2021-10-18 11:21:18 +00:00
* **TRIPO5** \[]
2024-02-11 02:13:58 +00:00
* `UE9vSbnBW6psVzxB`
2021-10-18 11:21:18 +00:00
* **FERON74** \[]
2024-02-11 02:13:58 +00:00
* `PbGkNudxCzaKBm0x`
2021-10-18 11:21:18 +00:00
* **GILA7** \[]
2024-02-11 02:13:58 +00:00
* `D+nkv8C1qIKMErY1`
2021-10-18 11:21:18 +00:00
* **Citrix CTX1** \[]
2024-02-11 02:13:58 +00:00
* `MNGIKCAHMOGLKPAKMMGJKNAINPHKLOBLNNHILCBHNOHLLPBK`
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
[http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html ](http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html ) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html )
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### HackerizeXS \[_╫Λ↻├☰┏_]
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
╫☐↑Λ↻Λ┏Λ↻☐↑Λ
```
2022-07-05 17:49:17 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html )
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### Morse
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ) - 404 Mfu: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html ](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html )
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
.... --- .-.. -.-. .- .-. .- -.-. --- .-.. .-
```
2022-07-05 17:49:17 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html ](http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html ) - 404 Dead: [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ )
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### UUencoder
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html ](http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html ) - 404 Mfu: [https://gchq.github.io/CyberChef/ ](https://gchq.github.io/CyberChef/ )
### UUencoder
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
begin 644 webutils_pl
M2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(
M3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/
F3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$$`
`
end
```
* [http://www.webutils.pl/index.php?idx=uu ](http://www.webutils.pl/index.php?idx=uu )
2022-07-05 17:49:17 +00:00
### XXEncoder
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
XXEncoder ni kifaa kinachotumiwa kubadilisha data kuwa muundo mwingine ambao ni vigumu kusoma. Inaweza kutumika kuficha habari nyeti au kubadilisha data ili kuepuka uchunguzi. Kwa mfano, inaweza kutumika kubadilisha faili ya maandishi kuwa muundo wa Base64 ili kuficha maudhui yake halisi. Kwa kawaida, XXEncoder hutumiwa katika mazingira ya usalama na uchunguzi wa kina.
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
begin 644 webutils_pl
hG2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236
5Hol-G2xAEE++
end
```
* [www.webutils.pl/index.php?idx=xx ](https://github.com/carlospolop/hacktricks/tree/bf578e4c5a955b4f6cdbe67eb4a543e16a3f848d/crypto/www.webutils.pl/index.php?idx=xx )
2022-07-05 17:49:17 +00:00
### YEncoder
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
YEncoder ni njia ya kubadilisha data kuwa muundo wa ASCII. Inatumika mara nyingi katika ujumbe wa barua pepe na kwenye mitandao ya zamani ya Usenet. YEncoder inachukua data ya binary na kuiweka katika muundo wa ASCII ili iweze kutumwa kwa urahisi kupitia njia za mawasiliano ambazo zinaweza kuharibu data ya binary.
YEncoder inafanya hivyo kwa kuchukua kila byte ya data ya binary na kuiweka katika muundo wa ASCII kwa kutumia kanuni maalum. Kanuni hii inahusisha kubadilisha kila byte kuwa kifungu cha ASCII kinachowakilisha thamani ya byte hiyo. Kwa mfano, byte ya 0x41 itabadilishwa kuwa kifungu cha ASCII kinachowakilisha herufi "A".
Kwa kubadilisha data ya binary kuwa muundo wa ASCII, YEncoder inaruhusu data hiyo kutumwa kupitia njia za mawasiliano ambazo zinaweza kuharibu data ya binary, kama vile barua pepe au mitandao ya zamani ya Usenet. Wakati data inapokelewa upande wa pili, YDecoder hutumiwa kubadilisha tena muundo wa ASCII kuwa data ya binary ya awali.
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
=ybegin line=128 size=28 name=webutils_pl
ryvkryvkryvkryvkryvkryvkryvk
=yend size=28 crc32=35834c86
```
* [http://www.webutils.pl/index.php?idx=yenc ](http://www.webutils.pl/index.php?idx=yenc )
2022-07-05 17:49:17 +00:00
### BinHex
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
BinHex ni mfumo wa uandishi wa faili ambao hutumiwa kubadilisha data ya binary kuwa maandishi yanayoweza kusomwa. Inatumika sana katika uhamishaji wa faili kwenye mitandao ya zamani. Mfumo huu unatumia msimbo wa hexadecimal kuwakilisha data ya binary. Kwa kawaida, faili za BinHex zina ugani wa ".hqx".
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
(This file must be converted with BinHex 4.0)
:#hGPBR9dD@acAh"X!$mr2cmr2cmr!!!!!!!8!!!!!-ka5%p-38K26%& )6da"5%p
-38K26%'d9J!!:
```
* [http://www.webutils.pl/index.php?idx=binhex ](http://www.webutils.pl/index.php?idx=binhex )
2022-07-05 17:49:17 +00:00
### ASCII85
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
ASCII85 ni mbinu ya kubadilisha data ya binary kuwa maandishi ya ASCII. Mbinu hii inatumika katika uwanja wa usalama wa mtandao na uhandisi wa nyuma. Inaweza kutumika kuficha data au kubadilisha data ya binary kuwa muundo unaoweza kusomwa na binadamu. Mbinu hii inatumika mara nyingi katika CTFs na shughuli za udukuzi.
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
< ~85DoF85DoF85DoF85DoF85DoF85DoF~>
```
* [http://www.webutils.pl/index.php?idx=ascii85 ](http://www.webutils.pl/index.php?idx=ascii85 )
2024-02-11 02:13:58 +00:00
### Kibodi ya Dvorak
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
drnajapajrna
```
2024-02-11 02:13:58 +00:00
* [https://www.geocachingtoolbox.com/index.php?lang=sw\&page=dvorakKeyboard ](https://www.geocachingtoolbox.com/index.php?lang=sw\&page=dvorakKeyboard )
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### A1Z26
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Barua kwa thamani zao za nambari
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
8 15 12 1 3 1 18 1 3 15 12 1
```
2024-02-11 02:13:58 +00:00
### Ufungaji wa Chanzo cha Affine
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Barua hadi nambari `(ax+b)%26` (_a_ na _b_ ni funguo na _x_ ni barua) na matokeo kurudi kwa barua
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
krodfdudfrod
```
2024-02-11 02:13:58 +00:00
### Msimbo wa SMS
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
**Multitap** [inabadilisha herufi ](https://www.dcode.fr/word-letter-change ) kwa nambari zinazorudiwa zilizofafanuliwa na nambari ya ufunguo inayolingana kwenye [kibodi ya simu ](https://www.dcode.fr/phone-keypad-cipher ) (Hali hii hutumiwa wakati wa kuandika SMS).\
Kwa mfano: 2=A, 22=B, 222=C, 3=D...\
Unaweza kutambua msimbo huu kwa sababu utaona\*\* nambari kadhaa zinazorudiwa\*\*.
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Unaweza kufichua msimbo huu kwa kutumia: [https://www.dcode.fr/multitap-abc-cipher ](https://www.dcode.fr/multitap-abc-cipher )
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
### Msimbo wa Bacon
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Badilisha kila herufi kwa As au Bs nne (au 1s na 0s)
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
00111 01101 01010 00000 00010 00000 10000 00000 00010 01101 01010 00000
AABBB ABBAB ABABA AAAAA AAABA AAAAA BAAAA AAAAA AAABA ABBAB ABABA AAAAA
```
2024-02-11 02:13:58 +00:00
### Alama za Kukimbia
2021-08-30 22:36:25 +00:00
![](../.gitbook/assets/runes.jpg)
2024-02-11 02:13:58 +00:00
## Ufupishaji
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
**Raw Deflate** na **Raw Inflate** (unaweza kupata zote mbili katika Cyberchef) zinaweza kufupisha na kurejesha data bila vichwa.
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
## Crypto Rahisi
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### XOR - Autosolver
2021-08-30 22:36:25 +00:00
* [https://wiremask.eu/tools/xor-cracker/ ](https://wiremask.eu/tools/xor-cracker/ )
2022-07-05 17:49:17 +00:00
### Bifid
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Inahitajika neno muhimu
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
fgaargaamnlunesuneoa
```
2022-07-05 17:49:17 +00:00
### Vigenere
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Inahitajika neno muhimu
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
wodsyoidrods
```
* [https://www.guballa.de/vigenere-solver ](https://www.guballa.de/vigenere-solver )
* [https://www.dcode.fr/vigenere-cipher ](https://www.dcode.fr/vigenere-cipher )
* [https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx ](https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx )
2024-02-11 02:13:58 +00:00
## Crypto Imara
2021-08-30 22:36:25 +00:00
2022-07-05 17:49:17 +00:00
### Fernet
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
2 herufi za msingi 64 (ishara na ufunguo)
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
Token:
gAAAAABWC9P7-9RsxTz_dwxh9-O2VUB7Ih8UCQL1_Zk4suxnkCvb26Ie4i8HSUJ4caHZuiNtjLl3qfmCv_fS3_VpjL7HxCz7_Q==
Key:
-s6eI5hyNh8liH7Gq0urPC-vzPgNnxauKvRO4g03oYI=
```
* [https://asecuritysite.com/encryption/ferdecode ](https://asecuritysite.com/encryption/ferdecode )
2024-02-11 02:13:58 +00:00
### Kugawanya Siri ya Samir
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
Siri inagawanywa katika sehemu X na ili kuirejesha unahitaji sehemu Y (_Y < =X_).
2021-10-18 11:21:18 +00:00
```
2021-08-30 22:36:25 +00:00
8019f8fa5879aa3e07858d08308dc1a8b45
80223035713295bddf0b0bd1b10a5340b89
803bc8cf294b3f83d88e86d9818792e80cd
```
[http://christian.gen.co/secrets/ ](http://christian.gen.co/secrets/ )
2024-02-11 02:13:58 +00:00
### Kuvunja nguvu ya OpenSSL
2021-08-30 22:36:25 +00:00
* [https://github.com/glv2/bruteforce-salted-openssl ](https://github.com/glv2/bruteforce-salted-openssl )
2022-07-05 17:49:17 +00:00
* [https://github.com/carlospolop/easy\_BFopensslCTF ](https://github.com/carlospolop/easy\_BFopensslCTF )
2021-08-30 22:36:25 +00:00
2024-02-11 02:13:58 +00:00
## Zana
2021-08-30 22:36:25 +00:00
* [https://github.com/Ganapati/RsaCtfTool ](https://github.com/Ganapati/RsaCtfTool )
* [https://github.com/lockedbyte/cryptovenom ](https://github.com/lockedbyte/cryptovenom )
* [https://github.com/nccgroup/featherduster ](https://github.com/nccgroup/featherduster )
2022-04-28 16:01:33 +00:00
< details >
2024-02-11 02:13:58 +00:00
< summary > < strong > Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na< / strong > < a href = "https://training.hacktricks.xyz/courses/arte" > < strong > htARTE (HackTricks AWS Red Team Expert)< / strong > < / a > < strong > !< / strong > < / summary >
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa muundo wa PDF** Angalia [**MPANGO WA KUJIUNGA** ](https://github.com/sponsors/carlospolop )!
* Pata [**swag rasmi wa PEASS & HackTricks** ](https://peass.creator-spring.com )
* Gundua [**The PEASS Family** ](https://opensea.io/collection/the-peass-family ), mkusanyiko wetu wa [**NFTs** ](https://opensea.io/collection/the-peass-family ) za kipekee
* **Jiunge na** 💬 [**Kikundi cha Discord** ](https://discord.gg/hRep4RUj7f ) au [**kikundi cha telegram** ](https://t.me/peass ) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks_live** ](https://twitter.com/hacktricks_live )**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwenye** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) na [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github repos.
2022-04-28 16:01:33 +00:00
< / details >