Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Resources
  3. Contest / CTF
  4. Riddled History: Hash Cracking and Reverse Engineering Challenge

Riddled History: Hash Cracking and Reverse Engineering Challenge

Scheduled Pinned Locked Moved Contest / CTF
5 Posts 2 Posters 276 Views 2 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Online
    cycloneC Online
    cyclone
    Admin Trusted
    wrote on last edited by
    #1

    Title: Riddled History
    Author: cyclone
    URL: https://github.com/cyclone-github/challenge/tree/main/RiddledHistory
    Description:

    • A fun challenge consisting of 4 main sets of challenges, each with their own set of hints, riddles and quests.
    • Challenge contains hints of fairy tails, classic movies and American history, all incorporated into hashes, encrypted files, and finishes strong with a simple, but challenging, reverse engineering "capture the flag".

    Experience Required:

    • hash cracking = Beginner / Intermediate
    • reverse engineering = Beginner / Intermediate

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    👍
    3
    • A1131A Offline
      A1131A Offline
      A1131
      Trusted
      wrote on last edited by
      #2

      Funfacts in a fairy-tale atmosphere on this challange. I managed to break a few file hashes, although Dorothy's spreadsheet was not for me to look at... Just as well to see the contents of 100 SHA1-like hashes was not for my sensitive eyes. I did get to the july4th.bin file, but I have the system misconfiguration that I was unable to read the flag too. Should I try to decompile/recompile binary on a software so praised by the NSA? I rathergive up.

      Amateur of mycology and hashcracking | 1x3060Ti | 1x1050Ti
      PGP:4B0A386530D789157435DC7489138FB52FDD7FC1

      1 Reply Last reply
      0
      • cycloneC Online
        cycloneC Online
        cyclone
        Admin Trusted
        wrote on last edited by
        #3

        july4th.bin hint:

        Decompiling is a great way to fine the flag. You're probably just a few digits off.

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • A1131A Offline
          A1131A Offline
          A1131
          Trusted
          wrote on last edited by
          #4

          Tempting, but I'm going by the rule 'measure your strength by your intentions'. I am not familiar with software code and I think I will stay with my hobby of simpler hashes.

          Amateur of mycology and hashcracking | 1x3060Ti | 1x1050Ti
          PGP:4B0A386530D789157435DC7489138FB52FDD7FC1

          1 Reply Last reply
          0
          • cycloneC Online
            cycloneC Online
            cyclone
            Admin Trusted
            wrote on last edited by
            #5

            Decompiling is pretty simple on july.bin, but you can also check the walk-through which contains its source code and also hash:plains for the challenge.

            Here's an online decompiler for july.bin:

            https://dogbolt.org/?id=f4642a6c-6910-47b5-9e54-283666003716

            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
            3x RTX 4090

            1 Reply Last reply
            1
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            Who's Online [Full List]

            6 users active right now (3 members and 3 guests).
            hashpwn-bot, cyclone, bloodybunny008

            Board Statistics

            Our members have made a total of 4.0k posts in 150 topics.
            We currently have 260 members registered.
            Please welcome our newest member, iceman.
            The most users online at one time was 49 on Thursday, December 26, 2024.

            • Login

            • Don't have an account? Register

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent