CTFLEARN: BruXOR Writeup

Prompt: There is a technique called bruteforce. Message: q{vpln’bH_varHuebcrqxetrHOXEj No key! Just brute .. brute .. brute … 😀

The goal is obvious based on the prompt, brute force an XOR’d message. I decided to use my Parrot OS Linux VM for this one. xortool is a python application that is perfect for this problem. From the xortool github page, A tool to do some xor analysis: guess the key length; guess the key. I began by creating a text file called “xor.txt” that contained the encoded message and then ran the following command:

xortool -b xor.txt

This created a directory called “xortool_out” that contained 255 files that could potentially contain the flag. I viewed all the files in the directory by running the following:

cat ./*.out | less

Once in less you can search the results for the flag by typing the following:

/flag

Among the chaos we find the flag.

Flag: flag{y0u_Have_bruteforce_XOR}

Key Takeaway: Xortool is a very strong python app that can bruteforce data that has been modified with XOR.

Word Count: 178