@0xEA31 said:
As you may have noticed in the video, basic Walzer is a repeated sequence of three steps. The teacher calls them âstepâ, âsideâ, âcloseâ.Since easy cryptography is involved, you should map these steps with some kind of basic cypher algorithms.
Looking at the starting position, an educated eye should catch the first âstepâ immediately. What about the others? You choose, but choose wisely because, after three steps, you have to be in a different place, but in the same position.
And remember: youâre dancing, come on donât be shy, let the music flow and continue. After all, the teacher says: âwe can keep that going until the end of the songâ. And we do know when the music stops, donât we?
I hereby want to apologize to the author and the HTB staff for my rage. We shouldnât have raged this hard about the challenge and expressed ourselves in a more polite way. After all this is just a mistake, and we all make mistakes. Letâs not discourage the author from making more challenges! Iâm sure he got much more in store than this!
The challenge playtesters need to learn what âcryptoâ means. Apart from Optimus Prime, the last 4 crypto challenges released have all been dumb guessing games, and a poor reflection of how fascinating and educational good crypto CTF challenges can be.
Still have no idea, should I try rotation and combinations of all pieces of base64 codes?
A worthy replacement for snake
Any help with this? I have no idea what the hints mean
I dont think this challenge is as bad as the above comments make out. Yes the hints are terrible, and yes Iâd prefer more modern crypto challenges, but the actual meat of this challenge practices basic skills.
@WarrenVos - (and any one else having a problem starting) Look for a pattern in the bytes after the first decoding, think about what that might imply
Hello everyone, this is my first posft.
Iâm struggling with this challenge, how can I ask for a hint here? Iâve came across some kind of flat that has a heart (<3) but dunno how to continue.
Any help is welcome!
Type your comment> @thecowmilk said:
All you ppl are some bad pu$$!35, leave the creator alone if you canât solve it, its not his fault, its yours because you know â â â â ! Idk why are you here, to entertain or to be a real cyber security or a real good hacker.
I bet you people that get into hackthebox is in thanks of other people who posted videos how to get in. If you aim to be a cyber security or a hacker, you donât have to blame the creator how hard is to decipher a hash because if you would be in real life, you would â â â â everything up!!
What if you get to get some real hashing in real life from a black hacker, you would shout at him why he made that so secure that your little brain canât decipher it?? Get a life and if you canât handle this go away rather that you say some bsâŚ
Wow, so edgy. This challenge has nothing to do with real cybersecurity and a âblack hackerâ worth his salt would base his security on actual cryptography. Iâd rather learn about the ways that RSA, Diffie-Hellmann can be broken in practice than waste learning time trying to decipher a dumb challenge created from stringing together obscure ciphers in Cyberchef.
I did not particularly enjoy this challenge because it relied so much on guessing, this wonât make me severely complain or verbally attack the author. I think many of you forget that this is a free platform, and we have an author here who just thought this might be a good challenge, he didnât get paid or anything, he did it in his free time because he thought it would be nice.
Try and keep this in mind when you want to lash out against someone providing free content to the site. If you donât like a challenge, simply give a downvote or come up with some constructive feedback, try not to be a â â â â about it.
The fact that I donât know what to do makes me crazy. Iâm actually very curious about the solution.
1 ) I think the first step is to use a very common encoding technique
2 ) The result from the first step is binary. Maybe we should look at some pattern (as someone suggested). There are repeating numbers and from some âprospectivesâ repeating sequences⌠but i canât find a logic behind all this.
3 ) Does mapping bytes (with Walzer steps) implies that we should see them as a two dimensional array?
4 ) Someone said CyberChef. Didnât know it. A very good site. Is the right algorithm in there? And if there is, maybe the challenge is not related to a custom walzer-cypher (?)
Any hint?
Always thanks to the people that make this platform work (authors and owners).
People have the opportunity to face a problem and learn something new.
Type your comment> @0xEA31 said:
You may be right, you may be wrong. But you should really support your opinions more politely. Thatâs being said, I leave you all alone.
I agree. There are definitely nicer ways to go about sharing your opinions without all the hate messages. I thought this was supposed to be a community. We are all human and my opinion is that haters are are a lot worse than people who approve 1 in 50 challenges that shouldnât be approved. This kind of hate is why we have so many people with depression. Well done for your efforts @0xEA31. Some people donât realise that no one is perfect and they lash out. Donât let all the hate stop you from making mistakes and learning from them. Itâs the only way to become great at it.
Plz someone tell me what to do with this sha256: a3108d25bab73b60dd9197102120e180adb3a9572cc00535beedc8bd9405c1a3
*I could see this in all the challenges.
*This is my first challengeâŚI would be glad if someone spend your time to help to out âŚ
Type your comment> @Anonymousyoyo said:
Plz someone tell me what to do with this sha256: a3108d25bab73b60dd9197102120e180adb3a9572cc00535beedc8bd9405c1a3
*I could see this in all the challenges.
*This is my first challengeâŚI would be glad if someone spend your time to help to out âŚ
You can use that to make sure the zip you downloaded hasnât been altered.
If you get the hash of your zip file it should match exactly.
[sha256sum file for linux or Get-FileHash -Algorithm sha256 filename in powershell
It doesnât have anything to do with the challenge other than a sanity check to make sure your file didnât get corrupted
Ok. Solved. Thanks to @bjornmorten. Hints
Waltz Dance Steps
- Obvious
- âBrute Forceâ
- âA very simple form of encryptionâ
All three are basic âencryptionâ schemes, do not go into complex encryption which require IVâs. Use CyberChef to find the schemes you need, then use Python to automate it, otherwise doing it manually will take ages, and you might need to âdanceâ more than once
but do note that unlike the video, the beginning and ending legs are the SAME in this version of dance
Can anyone please tell me how to solve the second step for this challenge? What we have to look on the binary pattern? Iâm stucked on this part for so long already
Type your comment> @hyperreality said:
The challenge playtesters need to learn what âcryptoâ means. Apart from Optimus Prime, the last 4 crypto challenges released have all been dumb guessing games, and a poor reflection of how fascinating and educational good crypto CTF challenges can be.
I have to agree. I would very much prefer challenges about weaknesses in modern crypto and cryptanalysis.
Just to add on, the RsaCtfTools is another good one in the set. Automated tools donât help much and youâre forced to understand the crypto behind it and think modularly.
Got it. Tried a very obvious âkeyâ for one of the steps.
Type your comment> @0xEA31 said:
I have to admit that I created this challenge with a precise scope: showing how information asymmetry deeply impacts our ability to give an answer to or solve problems.
Information asymmetry occurs when one party has more or better information than the other. This is quite a typical situation with our challenges and boxes: makers (think that they) know everything and players donât.
There are may facets that we should consider when dealing with information asymmetry. The first one is about the domain of discussion. When the domain is uncertain (or misunderstood), we donât actually know where to focus on.
So, here you are some clarifications on the âdomain of discussionâ of this âEasy cryptography made harder in Walzer styleâ:
First, âeasy cryptographyâ is literally what the general consensus consider âeasyâ or, if you prefer, âbasicâ. And remember, âcryptographyâ is generally an uncountable name.
Second, Walzer refers to the dance. I choose the German word because it originated in Germany (Walzer (Tanz) â Wikipedia). If you read the English version of Wikipedia you can find:
The waltz (from German Walzer [ËvaltÍĄsÉĚŻ]) is a ballroom and folk dance, normally in triple time, performed primarily in closed position.
Great hint! Helpd almost right away!