PicoCTF-2021 Writeup
  • README
  • Binary Exploitation
    • Binary Gauntlet 0
    • Binary Gauntlet 1
    • Stonks
    • What's your input?
  • Cryptography
    • Compress and Attack
    • Dachshund Attacks
    • Double DES
    • Easy Peasy
    • It is my Birthday 2
    • It's Not My Fault 1
    • Mini RSA
    • New Caesar
    • New Vignere
    • No Padding, No Problem
    • Pixelated
    • Play Nice
    • Scrambled: RSA
  • Forensics
    • Disk, disk, sleuth!
    • Disk, disk, sleuth! II
    • information
    • MacroHard WeakEdge
    • Matryoshka doll
    • Milkslap
    • Surfing the Waves
    • Trivial Flag Transfer Protocol
    • tunn3l v1s10n
    • Very very very Hidden
    • Weird File
    • Wireshark doo dooo do doo...
    • Wireshark twoo twooo two twoo...
  • Reverse Engineering
    • ARMssembly 0
    • ARMssembly 2
    • ARMssembly 3
    • ARMssembly 4
    • gogo
    • Hurry up! Wait!
    • keygenme-py
    • Let's get dynamic
    • Rolling My Own
    • Shop
    • speeds and feeds
    • Transformation
  • Web Exploitation
    • Ancient History
    • Bithug
    • GET aHEAD
    • It is my Birthday
    • More Cookies
    • Most Cookies
    • Scavenger Hunt
    • Some Assembly Required 1
    • Some Assembly Required 2
    • Some Assembly Required 3
    • Some Assembly Required 4
    • Super Serial
    • Web Gauntlet 2
    • Web Gauntlet 3
    • Who are you?
    • X marks the spot
Powered by GitBook
On this page
  • Problem
  • Solution
  • Flag

Was this helpful?

Edit on GitHub
  1. Cryptography

Play Nice

PreviousPixelatedNextScrambled: RSA

Last updated 2 years ago

Was this helpful?

Problem

Not all ancient ciphers were so bad... The flag is not in standard format. nc mercury.picoctf.net 6057 playfair.py

Solution

  1. Look at the source code and at the bottom it links to

  2. Find a Playfair cipher decoder, such as . Paste in the ciphertext y7bcvefqecwfste224508y1ufb21ld and the alphabet/key meiktp6yh4wxruavj9no13fb8d027c5glzsq. Make sure to increase the grid size to 6x6 so the entire alphabet fits.

  3. Click "Decrypt" to get WD9BUKBSPDTJ7SKD3KL8D6OA3F03G0 convert this to lowercase with python -c "print('WD9BUKBSPDTJ7SKD3KL8D6OA3F03G0'.lower())" to get wd9bukbspdtj7skd3kl8d6oa3f03g0.

  4. Paste the decrypted text into the program on the server to get the flag: Congratulations! Here's the flag: 2e71b99fd3d07af3808f8dff2652ae0e.

Flag

2e71b99fd3d07af3808f8dff2652ae0e

Program
the Wikipedia page for a Playfair cipher
DCode