@m0noc said:
solved it - doing the right things but the “not so obvious” thing I needed was the thing I was miscalculating. So close for all this time yet so far.
tried xor and some classic ciphers…but can’t figure out anything
a nudge in the right direction would be appreciated !!
Ive found what I needed for the final part of it, but I have no clue how to convert and give it what it needs to give me what I need.
@m0noc any of that sweet sweet experience you want to share? I tried DMing you but HTB seems to have a bug when it comes to logging in on the forum to send messages.
@chenxiaolong said:
I’m also struggling with this one.
What (I think) I know:
The secret is encrypted using a certain algorithm invented in 1979 that requires >=k pieces of data to decrypt
Each share has a 2-character prefix followed by some data encoded with a 58-character alphabet
I’m not sure where to go from here though. If I try to decrypt using anything from 1 share to 10 shares, I seem to get meaningless data.
I’m in pretty much this same spot. I’m almost positive that I’m decoding the values properly, as the prime value decodes into something that’s well-known.
However, regardless of the number of shares I use, I’m getting (seemingly) junk data.
Solved. A friend of mine gave me a hint towards a detail I was overlooking. I’d wager it was the same thing @m0noc was stuck on. It’s very easy to overthink this one. Feel free to PM me if you need a nudge.
Solved thanks to a hint from @opt1kz. For those working on this, hopefully this isn’t too big of a hint: be sure to use all available data in the three relevant columns.
I could use some help with that challenge. I’m probably at the same point… I used couple of implementations of SSS, but couldn’t figure out how to make it “spit out” what I need.
The point is to understand the correct “ingredients”. Follow what chainxiaolong said, use the full data of those columns remembering that the all of the “ingredients” must be of the required type.
Just managed to crack this with the help of @chenxiaolong’s hint, and reading carefully about the implementation of the relevant cipher. Without that it I could have wasted a lot of time on a minor detail - thank you.
Solved it! Big thanks to @opt1kz and @chenxiaolong for their hints. The only hint I can give other than the ones already given is once you’ve determined what kind of crypto is in play, the most common search result in Google should provide you with all you need.
@chenxiaolong said:
Solved thanks to a hint from @opt1kz. For those working on this, hopefully this isn’t too big of a hint: be sure to use all available data in the three relevant columns.
now this is something that nudged me in the right direction when i was completely stuck, thanks man!
can somebody give me a hint, i think i correctly did the algo from opt1kz but i don’t get what to do with the ‘3rd’ , or public column. tried xor’ing, even a second otrder sss with result from 1 and public. but seem to get nowhere.
Pfew, tough challenge, overlooked the simple things, and started with complex stuff…
A little hint on the ‘3rd’ column, it is only divisible by itself and by 1
Oh boy, that was quite something!
If you’re (like me) just using the last part of the second field, try to look up what exactly an IP address is (what data structure) and how it is represented.