Menu

Crypto Basics

Base64 Encoding

The challenge gives you an encoded string. An easy way to decode base64 is using the command line. Use this command:

echo <encoded string> | base64--decode

Other Encoding

This challenge gives you an xor encoded string. For this, the easiest method is to use an online tool. I found this tool helpful: https://strelitzia.net/wasXORdecoder/wasXORdecoder.html

Plain Hashing

This challenge wants you to decode a MD5 hash. The best way is using an online decoder, such as: https://hashes.com/en/decrypt/hash

Private Key

This challenge is finding the modulus and the signature based on the modulus of a private RSA key. First to find the modulus you can save the private key as test.key, then run this command openssl rsa -in test.key -pubout > test.pub, followed by this command openssl rsa -in test.pub -pubin -modulus -noout

For the signature, enter this command: echo -n "<modulus>" | openssl dgst -sign test.key -sha256 | base64

Java cacerts

For this challenge we need to fire up a Docker container, because I am running WebGoat in Docker, I already have Docker up and running! docker run -d webgoat/assignments:findthesecret. The user in the container does not have permission to see the root directory, to get past this we can use docker cp to copy the /etc/passwd file from the container to our host, edit the file, then cp it back to the container.

docker cp <docker container id>:/etc/passwd pass.txt

vim pass.txt

Change the UID & GID of the user webgoat from 1000:1000 to 0:0, the file should look like this


~# cat pass.txt
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/bin/false
webgoat:x:0:0::/home/webgoat:

Now copy the file back docker cp pass.txt 098f135c6b08:/etc/passwd

Access the container docker exec -it <docker container id> /bin/bash

Run the decryption against the secret file

echo "U2FsdGVkX199jgh5oANElFdtCxIEvdEvciLi+v+5loE+VCuy6Ii0b+5byb5DXp32RPmT02Ek1pf55ctQN+DHbwCPiVRfFQamDmbHBUpD7as=" | openssl enc -aes-256-cbc -d -a -kfile default_secret