repo
stringlengths
7
90
file_url
stringlengths
81
315
file_path
stringlengths
4
228
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-04 14:38:15
2026-01-05 02:33:18
truncated
bool
2 classes
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/tests/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/tests/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/environ.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/environ.py
import os def getenv(key: str) -> str: """Get environment variable and raise an error if it is unset.""" if val := os.getenv(key): return val msg = "ENV variable %s is required!" raise OSError(msg % key) IS_DEV = os.getenv("ENV") == "DEV"
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/utils.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/utils.py
from base64 import urlsafe_b64decode, urlsafe_b64encode def encode(content: bytes | str) -> str: def _encode(): if isinstance(content, str): return urlsafe_b64encode(content.encode()).decode() return urlsafe_b64encode(content).decode() return _encode().replace("=", "") def decode(content: str | bytes) -> bytes: rem = len(content) % 4 if rem > 0: try: content += b"=" * (4 - rem) except Exception: content += "=" * (4 - rem) if isinstance(content, str): return urlsafe_b64decode(content.encode()) return urlsafe_b64decode(content) def chunk(stuff: bytes): """Chunk stuff into 16 byte blocks.""" assert len(stuff) assert len(stuff) % 16 == 0 blocks = [] for i in range(0, len(stuff), 16): blocks.append(stuff[i : i + 16]) return blocks
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/resp.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/resp.py
from __future__ import annotations from fastapi import HTTPException, status PERMISSION_DENIED = HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail="Permission denied.", ) def not_found(model: object) -> HTTPException: return HTTPException( status_code=status.HTTP_404_NOT_FOUND, detail=f"{model.__name__} not found.", )
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/auth.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/auth.py
from __future__ import annotations import json from datetime import UTC, datetime, timedelta from pathlib import Path from secrets import randbits from typing import Annotated from Crypto.Util.number import getPrime, long_to_bytes from fastapi import Cookie, Depends, HTTPException, Response, status from mvmcryption.crypto.cipher import SCBCCipher from mvmcryption.crypto.ecdsa import ECDSA, private_key from mvmcryption.crypto.jwt import SJWT from mvmcryption.crypto.rsa import RSA, PrivKey from mvmcryption.db.users import User, Users from mvmcryption.resp import PERMISSION_DENIED SJWT_TTL = timedelta(minutes=15) def global_ecdsa(private_key: Annotated[int, Depends(private_key)]) -> ECDSA: return ECDSA(private_key) def global_sjwt(ecdsa: Annotated[ECDSA, Depends(global_ecdsa)]): return SJWT(ecdsa) def create_sjwt(user: User, sjwt: SJWT, expires: datetime | None = None) -> str: _expires = expires or (datetime.now(UTC) + SJWT_TTL) return sjwt.encode({"sub": user.id, "exp": _expires.isoformat()}) def decode_sjwt(token: str, sjwt: SJWT, users: Users) -> User | None: if not token: return None try: decoded = sjwt.decode(token) except Exception: return None if not ( expiry_str := decoded.get("exp") ): # no expiry -> some token generated by an admin return None # for ~~security~~ budget reasons this is disabled right now # TODO: fix this if not isinstance(expiry_str, str): return None try: expiry = datetime.fromisoformat(expiry_str) except Exception: return None if not expiry or expiry <= datetime.now(UTC): return None user_id = decoded.get("sub") if user_id is None: return None if not isinstance(user_id, int): return None user = users.find(user_id) if user is None: return None return user def authorized_user( users: Annotated[Users, Depends(Users.dependency)], sjwt: Annotated[SJWT, Depends(global_sjwt)], response: Response, mvmcryptionauthtoken: Annotated[str | None, Cookie()] = None, ): user = decode_sjwt(mvmcryptionauthtoken, sjwt, users) if not user: if mvmcryptionauthtoken: response.delete_cookie("mvmcryptionauthtoken") raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Unauthorized.", ) return user def admin_user(user: Annotated[User, Depends(authorized_user)]): if not user.is_admin: raise PERMISSION_DENIED return user def _aes_key() -> bytes: f = Path("/etc/aes-key") if not f.exists(): f.write_bytes(long_to_bytes(randbits(128))) return f.read_bytes() def global_rsa() -> RSA: f = Path("/etc/rsa") if not f.exists(): key = PrivKey(getPrime(1024), getPrime(1024), 0x10001) f.write_text(json.dumps(key.__dict__)) rsa = RSA(PrivKey(**json.loads(f.read_text()))) assert rsa.verify(b"hello", rsa.sign(b"hello")) return rsa GlobalRSA = Annotated[RSA, Depends(global_rsa)] def global_aes(key: Annotated[bytes, Depends(_aes_key)]): return SCBCCipher(key) AuthorizedUser = Annotated[User, Depends(authorized_user)] AdminUser = Annotated[User, Depends(admin_user)] GlobalECDSA = Annotated[ECDSA, Depends(global_ecdsa)] GlobalSCBCCipher = Annotated[SCBCCipher, Depends(global_aes)]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/app.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/app.py
from fastapi import APIRouter, FastAPI from mvmcryption.db import initialize from mvmcryption.environ import IS_DEV from mvmcryption.routers import auth, crypto, users tags_metadata = [ { "name": "users", "description": "Operations with users.", }, { "name": "crypto", "description": "Cryptography stuff.", }, { "name": "auth", "description": "Logout/Login/Register stuff.", }, ] app = FastAPI( title="Much Vulnerable Machine API", description="3AM Crypto chall.", version="dQw4w9WgXcQ", openapi_tags=tags_metadata, ) if IS_DEV: from fastapi.middleware.cors import CORSMiddleware # building a frontend is left as exercise for the player app.add_middleware( CORSMiddleware, allow_origins=[ "http://localhost:5173", "http://localhost:4200", "http://localhost:3000", ], allow_credentials=True, allow_methods=["*"], allow_headers=["*"], ) app.add_event_handler("startup", initialize) api_router = APIRouter(prefix="/api") api_router.include_router(auth) api_router.include_router(crypto) api_router.include_router(users) app.include_router(api_router)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/db/users.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/db/users.py
from __future__ import annotations from argon2 import PasswordHasher, exceptions from pydantic import EmailStr, SecretStr from .db import BaseModel, DBModel PH = PasswordHasher() class User(BaseModel): username: str email: EmailStr password: SecretStr @property def is_admin(self): return self.id == 1 def send_email(self, subject: str, content: str) -> None: """Send e-mail to user.""" class Users(DBModel[User]): tablename = "users" model = User columns = ( "username", "email", "password", ) mutable_columns = ( "username", "email", ) def find_by_username(self, username: str): return self.find_by("username")(username) def create(self, *, username: str, email: str, password: str) -> User: _password = PH.hash(password) return self.insert( {"username": username, "email": email, "password": _password}, ) def login(self, username: str, password: str) -> User | None: if not (u := self.find_by_username(username)): return None try: PH.verify(u.password.get_secret_value(), password) return u except exceptions.VerifyMismatchError: return None
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/db/db.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/db/db.py
from __future__ import annotations import sqlite3 from abc import ABC, abstractmethod from collections.abc import Callable, Iterator, Sequence from contextlib import contextmanager from typing import Annotated, Generic, TypeVar from fastapi import Depends from pydantic import BaseModel as _BaseModel from mvmcryption.environ import getenv DB_PATH = getenv("DB_PATH") def connect_dependency() -> sqlite3.Connection: conn = sqlite3.connect(DB_PATH) conn.row_factory = sqlite3.Row conn.autocommit = True return conn @contextmanager def connect() -> Iterator[sqlite3.Connection]: conn = connect_dependency() try: yield conn finally: conn.close() class BaseModel(_BaseModel): id: int T = TypeVar("T", bound=BaseModel) V = TypeVar("V") class DBModel(ABC, Generic[T]): def __init__(self, conn: sqlite3.Connection) -> None: self.conn = conn @classmethod @property @abstractmethod def tablename(cls) -> str: raise NotImplementedError @classmethod @property @abstractmethod def columns(cls) -> Sequence[str]: raise NotImplementedError @classmethod @property @abstractmethod def mutable_columns(cls) -> Sequence[str]: raise NotImplementedError @classmethod @property @abstractmethod def model(cls) -> type[T]: raise NotImplementedError @classmethod @property def select_query(cls) -> str: return f"SELECT * FROM {cls.tablename} " @classmethod @property def delete_query(cls) -> str: return f"DELETE FROM {cls.tablename} " @classmethod @property def insert_query(cls) -> str: return f"INSERT INTO {cls.tablename} ({', '.join(cls.columns)}) VALUES ({', '.join(f':{col}' for col in cls.columns)}) RETURNING *;" @classmethod @property def update_query(cls) -> str: return f"UPDATE {cls.tablename} SET {', '.join([f'{col} = :{col}' for col in cls.mutable_columns])} " @contextmanager def cur(self) -> Iterator[sqlite3.Cursor]: cur = self.conn.cursor() try: yield cur finally: cur.close() def delete(self, id: int) -> None: return self.delete_by("id")(id) def delete_by(self, lookup: str) -> None: q = self.delete_query + f"WHERE {lookup} = ?;" def _delete_by(value) -> None: with self.cur() as cur: cur.execute(q, [value]) return _delete_by def insert(self, params: dict, **kwargs) -> T: with self.cur() as cur: cur.execute(self.insert_query, params, **kwargs) record = cur.fetchone() return self.model(**record) def update(self, id: int, params: dict) -> T: return self.update_by("id")(id, params) def update_by(self, lookup: str) -> Callable[[dict, ...], T]: if not self.update_query: raise Exception("Model is readonly.") q = self.update_query + f"WHERE {lookup} = :lookup RETURNING *;" def _update_by(value, params: dict, **kwargs) -> T: params["lookup"] = value with self.cur() as cur: cur.execute(q, params, **kwargs) record = cur.fetchone() return self.model(**record) return _update_by def find(self, id: int) -> T | None: return self.find_by("id")(id) def find_by(self, lookup: str) -> Callable[[V], T]: q = self.select_query + f"WHERE {lookup} = :{lookup};" def _find_by(value) -> T | None: with self.cur() as cur: cur.execute(q, [value]) if record := cur.fetchone(): return self.model(**record) return None return _find_by def all(self) -> list[T]: q = self.select_query + ";" with self.cur() as cur: cur.execute(q) return [self.model(**record) for record in cur.fetchall()] @classmethod def dependency(cls, db: Annotated[sqlite3.Connection, Depends(connect_dependency)]): return cls(db)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/db/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/db/__init__.py
from __future__ import annotations from mvmcryption.environ import getenv from .db import connect from .users import Users ADMIN_PASSWORD = getenv("ADMIN_PASSWORD") TABLE_QUERY = """ CREATE TABLE IF NOT EXISTS users ( id INTEGER PRIMARY KEY, username VARCHAR(50) NOT NULL UNIQUE, email VARCHAR(100) NOT NULL UNIQUE, password VARCHAR(100) NOT NULL ); """ def initialize() -> None: with connect() as conn: conn.executescript(TABLE_QUERY) try: Users(conn).create( username="admin", email="admin@this-company-luckily-does-not-exist.mvm", password=ADMIN_PASSWORD, ) except Exception as e: # maybe it already exists print(e) __all__ = [ "Users", "initialize", ]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/routers/users.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/routers/users.py
from typing import Annotated, Literal from fastapi import APIRouter, Depends, HTTPException, Response, status from pydantic import BaseModel, EmailStr from mvmcryption.auth import AuthorizedUser from mvmcryption.db import Users from mvmcryption.resp import PERMISSION_DENIED, not_found from mvmcryption.routers.auth import USERNAME_FIELD users_router = APIRouter(prefix="/users", tags=["users"]) class UpdateBody(BaseModel): username: str = USERNAME_FIELD email: EmailStr @users_router.get("/") def user_list( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], ): if user.is_admin: return users.all() return [user] @users_router.patch("/{user_id}") def update_user( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], body: UpdateBody, ): """Whoa! im updating things!""" if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED if user.id != user_id: user = users.find(user_id) if user.username != body.username and users.find_by("username")(body.username): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Username is not available.", ) email = body.email.lower() if user.email != email and users.find_by("email")(email): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Email is not available.", ) try: return users.update(user.id, dict(username=body.username, email=email)) except Exception: raise HTTPException( status_code=status.HTTP_418_IM_A_TEAPOT, detail="Something went very wrong.", ) @users_router.delete("/{user_id}") def delete_user( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], response: Response, ): if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED users.delete(user_id) response.delete_cookie("mvmcryptionauthtoken", secure=False, httponly=True) response.status_code = status.HTTP_204_NO_CONTENT @users_router.get("/{user_id}") def user_detail( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], ): if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED if record := users.find(user_id): return record raise not_found(Users.model)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/routers/crypto.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/routers/crypto.py
from datetime import datetime from random import getrandbits from Crypto.Util.number import long_to_bytes from fastapi import APIRouter from pydantic import BaseModel, validator from mvmcryption.auth import ( AuthorizedUser, GlobalECDSA, GlobalRSA, GlobalSCBCCipher, ) from mvmcryption.environ import getenv from mvmcryption.utils import decode, encode FLAG = getenv("FLAG").encode() crypto_router = APIRouter(prefix="/crypto", tags=["crypto"]) class ValidationBody(BaseModel): ciphertext: str iv: str signature: str debug: bool = False @validator("ciphertext") def validate_ciphertext(v): try: decoded = decode(v) except Exception: msg = "What exactly are you trying to achieve?" raise ValueError(msg) if len(decoded) % 16 != 0: msg = "????" raise ValueError(msg) return v @validator("iv") def validate_iv(v): try: decoded = decode(v) assert len(decoded) == 16 except Exception: msg = "What exactly are you trying to achieve?" raise ValueError(msg) return v @validator("signature") def validate_signature(v): try: decoded = int(v, 16) assert decoded > 1 except Exception: msg = "What exactly are you trying to achieve?" raise ValueError(msg) return v @crypto_router.get("/public-key") def ecdsa_public_key(ecdsa: GlobalECDSA) -> dict: """ECDSA Public Key.""" return ecdsa.pretty_public_key @crypto_router.get("/rsa-public-key") def rsa_public_key(_user: AuthorizedUser, rsa: GlobalRSA) -> dict: """RSA Public Key.""" return { "N": hex(rsa.priv.n), "e": hex(rsa.priv.e), } @crypto_router.post("/decrypt") def decrypt(user: AuthorizedUser, cipher: GlobalSCBCCipher, body: ValidationBody): """ Real men test in production. - Our CISO, probably """ if body.debug: if not user.is_admin: raise ValueError("no.") try: res = cipher.decrypt(decode(body.ciphertext), decode(body.iv)) user.send_email( f"Decryption Results from {datetime.now().isoformat()}", f"Plaintext = {res!r}", ) return {} except Exception as e: if body.debug: return {"err": str(e)} return {} @crypto_router.get("/flag") def flag(user: AuthorizedUser, cipher: GlobalSCBCCipher, rsa: GlobalRSA): iv = long_to_bytes(getrandbits(128), 16) ct = cipher.encrypt(FLAG, iv) sig = rsa.sign(iv + ct) return {"ciphertext": encode(ct), "signature": hex(sig)}
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/routers/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/routers/__init__.py
from .auth import auth_router as auth from .crypto import crypto_router as crypto from .users import users_router as users __all__ = [ "auth", "crypto", "users", ]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/routers/auth.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/routers/auth.py
from datetime import UTC, datetime from typing import Annotated from fastapi import APIRouter, Cookie, Depends, HTTPException, Response, status from pydantic import BaseModel, EmailStr, Field from mvmcryption.auth import ( SJWT_TTL, AuthorizedUser, create_sjwt, decode_sjwt, global_sjwt, ) from mvmcryption.crypto.jwt import SJWT from mvmcryption.db.users import Users from mvmcryption.environ import IS_DEV USERNAME_FIELD = Field(max_length=50, min_length=2) PASSWORD_FIELD = Field(max_length=100, min_length=8) class LoginBody(BaseModel): username: str = USERNAME_FIELD password: str = PASSWORD_FIELD class RegisterBody(BaseModel): email: EmailStr username: str = USERNAME_FIELD password: str = PASSWORD_FIELD auth_router = APIRouter(prefix="/auth", tags=["auth"]) @auth_router.get("/status") def user_status( users: Annotated[Users, Depends(Users.dependency)], sjwt: Annotated[SJWT, Depends(global_sjwt)], mvmcryptionauthtoken: Annotated[str | None, Cookie()] = None, ): """Return whether or not user is logged in.""" return {"authorized": bool(decode_sjwt(mvmcryptionauthtoken, sjwt, users))} @auth_router.post("/login") def login( body: LoginBody, response: Response, sjwt: Annotated[SJWT, Depends(global_sjwt)], users: Annotated[Users, Depends(Users.dependency)], ): if not (user := users.login(body.username, body.password)): raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid Credentials.", ) expires = datetime.now(UTC) + SJWT_TTL token = create_sjwt(user, sjwt, expires) response.set_cookie( "mvmcryptionauthtoken", token, expires=expires, secure=not IS_DEV, httponly=True, ) response.status_code = status.HTTP_204_NO_CONTENT @auth_router.post("/register") def register( body: RegisterBody, users: Annotated[Users, Depends(Users.dependency)], ): if users.find_by_username(body.username): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Username is not available.", ) email = body.email.lower() if users.find_by_username(email): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Email is not available.", ) if not ( user := users.create( username=body.username, email=email, password=body.password, ) ): raise HTTPException( status_code=status.HTTP_418_IM_A_TEAPOT, detail="Something went very wrong.", ) return user @auth_router.post("/logout") def logout(response: Response, user: AuthorizedUser): response.delete_cookie("mvmcryptionauthtoken") response.status_code = status.HTTP_204_NO_CONTENT
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/ecdsa.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/ecdsa.py
"""Cryptography stuff.""" from dataclasses import dataclass from hashlib import sha256 from pathlib import Path from random import getrandbits from secrets import randbelow from Crypto.Util.number import bytes_to_long, long_to_bytes from fastecdsa.curve import P256, Curve from fastecdsa.ecdsa import verify from fastecdsa.keys import get_public_key from fastecdsa.point import Point from mvmcryption.utils import decode, encode CURVE = P256 N = CURVE.q def private_key() -> int: f = Path("/etc/ecdsa-private-key") if not f.exists(): privkey = randbelow(N) f.write_text(str(privkey)) privkey = int(f.read_text()) return privkey def generate_nonce(k): """πŸ˜‡πŸ˜‡πŸ˜‡""" return getrandbits(k) def encode_signature(signature: tuple[int, int]) -> str: """Encode signature to following format: `<r.b64>.<s.b64>` """ r = encode(long_to_bytes(signature[0])) s = encode(long_to_bytes(signature[1])) return ".".join([r, s]) def decode_signature(encoded_signature: tuple[str, str]) -> tuple[int, int]: """Decode signature from the following format: `<r.b64>.<s.b64>` """ r = bytes_to_long(decode(encoded_signature[0])) s = bytes_to_long(decode(encoded_signature[1])) return r, s @dataclass class ECDSA: private_key: int curve: Curve = P256 def sign(self, msg: bytes) -> tuple[int, int]: z = int(sha256(msg).hexdigest(), 16) % N k = generate_nonce(128) # πŸ˜‡πŸ˜‡πŸ˜‡ R = k * P256.G r = R.x % N s = (pow(k, -1, N) * (z + r * self.private_key)) % N return (r, s) @property def public_key(self) -> Point: return get_public_key(self.private_key, self.curve) def verify(self, signature: tuple[int, int], msg: bytes) -> bool: return verify(signature, msg, self.public_key, curve=self.curve) @property def pretty_public_key(self) -> dict: return { "curve": { "name": self.curve.name, "G": [hex(self.curve.gx), hex(self.curve.gy)], "p": hex(self.curve.p), "n": hex(self.curve.q), }, "Q": [hex(self.public_key.x), hex(self.public_key.y)], }
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/jwt.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/jwt.py
from dataclasses import dataclass from json import dumps, loads from mvmcryption.utils import decode as b64decode from mvmcryption.utils import encode as b64encode from .ecdsa import ECDSA, decode_signature, encode_signature # SJWT -> Scuffed JSON Web Token; just some extra pain class SJWTError(ValueError): """Error for SJWT things.""" class SJWTEncodingError(SJWTError): """Errors for encoding SJWTs!""" class SJWTDecodeError(SJWTError): """Shit happend while decoding that SJWT!""" class SJWTVerificationError(SJWTError): """That SJWT nasty!""" @dataclass class SJWT: ecdsa: ECDSA def encode(self, payload: dict[str], requires_expiry=True) -> str: if "exp" not in payload and requires_expiry: raise SJWTEncodingError("Sir we need an expiry on the token!") as_string = dumps(payload) _body = as_string.encode() sig = encode_signature(self.ecdsa.sign(_body)) body = b64encode(_body) return body + "." + sig def decode(self, string: str, verify: bool = True) -> dict[str]: parts = string.split(".") if len(parts) != 3: # why even try this >:( raise SJWTDecodeError("WRONG AMOUNT OF parts! parts! >:C") try: body = b64decode(parts[0]) r, s = decode_signature(parts[1:]) except Exception: # JUST STOP IT; THIS IS SECURE!!!!!! >:C raise SJWTDecodeError("Bad token! bad bad bad!") if verify: self._verify(body, (r, s)) try: return loads(body.decode()) except Exception: raise SJWTDecodeError("funny user") def _verify(self, body: bytes, signature: tuple[int, int]) -> None: # raise if payload not satisfactory if not (self.ecdsa.verify(signature, body)): raise SJWTVerificationError(":c stop it")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/rsa.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/rsa.py
from dataclasses import dataclass from Crypto.Hash import SHA256 HASH_LEN = SHA256.digest_size assert HASH_LEN == 32 HASH_BITS = SHA256.digest_size * 8 assert HASH_BITS == 256 @dataclass class PrivKey: p: int q: int e: int @property def phi(self): return (self.p - 1) * (self.q - 1) @property def d(self): return pow(self.e, -1, self.phi) @property def n(self): return self.p * self.q @property def public_key(self): return PubKey(self.n, self.e) @property def u(self): return pow(self.p, -1, self.q) @dataclass class PubKey: n: int e: int @dataclass class RSA: priv: PrivKey def verify(self, m, sig): m_calc = int(pow(int(sig), int(self.priv.e), int(self.priv.n))).to_bytes( HASH_LEN, "big" ) return m_calc == SHA256.new(m).digest() def sign(self, m): """Sign msg.""" m = SHA256.new(m).digest() m = int.from_bytes(m, "big") return pow(m, self.priv.d, self.priv.n)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/cipher.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/cipher.py
from dataclasses import dataclass from random import getrandbits from Crypto.Cipher import AES from Crypto.Util.number import long_to_bytes from Crypto.Util.Padding import pad, unpad from pwn import xor from mvmcryption.crypto.rsa import RSA from mvmcryption.utils import chunk BLOCK_SIZE = 16 @dataclass class SCBCCipher: """ Scuffed CBC Cipher. If you're wondering why we aren't using CBC directly, this is part of our "Customer Retention Strategy". """ key: bytes @property def _ecb(self): return AES.new(self.key, AES.MODE_ECB) def encrypt(self, plaintext: bytes, iv: bytes) -> bytes: padded = pad(plaintext, BLOCK_SIZE) enc = [] blocks = chunk(padded) enc.append(self._ecb.encrypt(xor(blocks[0], iv))) for i, block in enumerate(blocks[1:]): enc.append(self._ecb.encrypt(xor(block, enc[i]))) return b"".join(enc) def decrypt(self, ciphertext: bytes, iv: bytes) -> bytes: ndec = chunk(ciphertext) dec = [] dec.append(xor(self._ecb.decrypt(ndec[0]), iv)) for i, block in enumerate(ndec[1:]): dec.append(xor(self._ecb.decrypt(block), ndec[i])) return unpad(b"".join(dec), BLOCK_SIZE)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-2/api/mvmcryption/crypto/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/tests/test_ecdsa.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/tests/test_ecdsa.py
import pytest from mvmcryption.crypto.ecdsa import ECDSA, decode_signature, encode_signature @pytest.mark.parametrize("msg", [b"helo", b'{"get pwned": 1337}']) @pytest.mark.parametrize("d", [1337, 895]) def test_ecdsa(msg: bytes, d: int): ecdsa = ECDSA(d) sig = ecdsa.sign(msg) assert ecdsa.verify(sig, msg) @pytest.mark.parametrize("msg", [b"helo", b'{"get pwned": 1337}']) @pytest.mark.parametrize("d", [1337, 895]) def test_ecdsa_signature_encoding_decoding(msg: bytes, d: int): ecdsa = ECDSA(d) sig = ecdsa.sign(msg) encoded_sig = encode_signature(sig) assert ecdsa.verify(decode_signature(encoded_sig.split(".")), msg)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/tests/test_cipher.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/tests/test_cipher.py
from random import getrandbits, seed import pytest from Crypto.Util.number import long_to_bytes from mvmcryption.crypto.cipher import XSCBCCipher from mvmcryption.crypto.rsa import RSA @pytest.mark.parametrize("msg", [b"helo", b'{"get pwned": 1337}']) @pytest.mark.parametrize("d", [1337, 895]) def test_xscbccipher(msg: bytes, d: int): key = long_to_bytes(d, 16) rsa = RSA() ciph = XSCBCCipher(key, rsa) seed(69) iv = long_to_bytes(getrandbits(128), 16) seed(69) ct, sig = ciph.encrypt(msg) assert ct assert sig assert msg == ciph.decrypt(ct, sig, iv)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/tests/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/tests/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/environ.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/environ.py
import os def getenv(key: str) -> str: """Get environment variable and raise an error if it is unset.""" if val := os.getenv(key): return val msg = "ENV variable %s is required!" raise OSError(msg % key) IS_DEV = os.getenv("ENV") == "DEV"
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/utils.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/utils.py
from base64 import urlsafe_b64decode, urlsafe_b64encode def encode(content: bytes | str) -> str: def _encode(): if isinstance(content, str): return urlsafe_b64encode(content.encode()).decode() return urlsafe_b64encode(content).decode() return _encode().replace("=", "") def decode(content: str | bytes) -> bytes: rem = len(content) % 4 if rem > 0: try: content += b"=" * (4 - rem) except Exception: content += "=" * (4 - rem) if isinstance(content, str): return urlsafe_b64decode(content.encode()) return urlsafe_b64decode(content) def chunk(stuff: bytes): """Chunk stuff into 16 byte blocks.""" assert len(stuff) assert len(stuff) % 16 == 0 blocks = [] for i in range(0, len(stuff), 16): blocks.append(stuff[i : i + 16]) return blocks
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/resp.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/resp.py
from __future__ import annotations from fastapi import HTTPException, status PERMISSION_DENIED = HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail="Permission denied.", ) def not_found(model: object) -> HTTPException: return HTTPException( status_code=status.HTTP_404_NOT_FOUND, detail=f"{model.__name__} not found.", )
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/auth.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/auth.py
from __future__ import annotations import json from datetime import UTC, datetime, timedelta from pathlib import Path from secrets import randbits from typing import Annotated from Crypto.Util.number import long_to_bytes from fastapi import Cookie, Depends, HTTPException, Response, status from mvmcryption.crypto.cipher import XSCBCCipher from mvmcryption.crypto.ecdsa import ECDSA, private_key from mvmcryption.crypto.jwt import SJWT from mvmcryption.crypto.rsa import RSA, PrivKey from mvmcryption.db.users import User, Users from mvmcryption.resp import PERMISSION_DENIED SJWT_TTL = timedelta(minutes=15) def global_ecdsa(private_key: Annotated[int, Depends(private_key)]) -> ECDSA: return ECDSA(private_key) def global_sjwt(ecdsa: Annotated[ECDSA, Depends(global_ecdsa)]): return SJWT(ecdsa) def create_sjwt(user: User, sjwt: SJWT, expires: datetime | None = None) -> str: _expires = expires or (datetime.now(UTC) + SJWT_TTL) return sjwt.encode({"sub": user.id, "exp": _expires.isoformat()}) def decode_sjwt(token: str, sjwt: SJWT, users: Users) -> User | None: if not token: return None try: decoded = sjwt.decode(token) except Exception: return None if not ( expiry_str := decoded.get("exp") ): # no expiry -> some token generated by an admin return None # for ~~security~~ budget reasons this is disabled right now # TODO: fix this if not isinstance(expiry_str, str): return None try: expiry = datetime.fromisoformat(expiry_str) except Exception: return None if not expiry or expiry <= datetime.now(UTC): return None user_id = decoded.get("sub") if user_id is None: return None if not isinstance(user_id, int): return None user = users.find(user_id) if user is None: return None return user def authorized_user( users: Annotated[Users, Depends(Users.dependency)], sjwt: Annotated[SJWT, Depends(global_sjwt)], response: Response, mvmcryptionauthtoken: Annotated[str | None, Cookie()] = None, ): user = decode_sjwt(mvmcryptionauthtoken, sjwt, users) if not user: if mvmcryptionauthtoken: response.delete_cookie("mvmcryptionauthtoken") raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Unauthorized.", ) return user def admin_user(user: Annotated[User, Depends(authorized_user)]): if not user.is_admin: raise PERMISSION_DENIED return user def _aes_key() -> bytes: f = Path("/etc/aes-key") if not f.exists(): f.write_bytes(long_to_bytes(randbits(128))) return f.read_bytes() def global_rsa() -> RSA: f = Path("/etc/rsa") # # an attack on these should also work on the remote! e = 116591970041706379718532155665908888266686385012306382255623803049685541583532192334750761495391545779868293489052594691148251145407647036423290759484206824818995957368289817829191698292230111628507603650574855287432967558368023637303008639037850782925263155866362959265023886375680369942961371288326084824041 p = 45451971945342384351746307287759765997973347839090260639694412464552793781005187267114562085821942688227357317219583361362353646878950896940183843297990546009873999147534085320185786757924396902950980568341191320751375188700478249675190215732576343159765113451640650736834237393822708039570047243039620286637 q = 72009118392764261626413427431876874126326129069984217748634549026407244590676396047494273221646252626614631969458719207393002919632651673891260405183783344104061153870552960970102444506174717483826221480719066827975881319667694098081439486875056139219733072421530544103531952960041530707457961396585927096347 if not f.exists(): # key = RSA.new() key = PrivKey(p, q, e) f.write_text(json.dumps(key.__dict__)) rsa = RSA(PrivKey(**json.loads(f.read_text()))) assert rsa.verify(b"hello", rsa.sign(b"hello")) return rsa GlobalRSA = Annotated[RSA, Depends(global_rsa)] def global_aes( key: Annotated[bytes, Depends(_aes_key)], rsa: GlobalRSA, ): return XSCBCCipher(key, rsa) AuthorizedUser = Annotated[User, Depends(authorized_user)] AdminUser = Annotated[User, Depends(admin_user)] GlobalECDSA = Annotated[ECDSA, Depends(global_ecdsa)] GlobalXSCBCCipher = Annotated[XSCBCCipher, Depends(global_aes)]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/app.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/app.py
from fastapi import APIRouter, FastAPI from mvmcryption.db import initialize from mvmcryption.environ import IS_DEV from mvmcryption.routers import auth, crypto, users tags_metadata = [ { "name": "users", "description": "Operations with users.", }, { "name": "crypto", "description": "Cryptography stuff.", }, { "name": "auth", "description": "Logout/Login/Register stuff.", }, ] app = FastAPI( title="MVMCryption", description="3AM Crypto chall. (some stuff might not mmake sense whoopsies)", version="dQw4w9WgXcQ", openapi_tags=tags_metadata, ) if IS_DEV: from fastapi.middleware.cors import CORSMiddleware # building a frontend is left as exercise for the player lol... # because I'm not a monster I added CORS headers, have fun app.add_middleware( CORSMiddleware, allow_origins=[ "http://localhost:5173", "http://localhost:4200", "http://localhost:3000", ], allow_credentials=True, allow_methods=["*"], allow_headers=["*"], ) app.add_event_handler("startup", initialize) api_router = APIRouter(prefix="/api") api_router.include_router(auth) api_router.include_router(crypto) api_router.include_router(users) app.include_router(api_router)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/db/users.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/db/users.py
from __future__ import annotations from argon2 import PasswordHasher, exceptions from pydantic import EmailStr, SecretStr from .db import BaseModel, DBModel PH = PasswordHasher() class User(BaseModel): username: str email: EmailStr password: SecretStr @property def is_admin(self): return self.id == 1 def send_email(self, subject: str, content: str) -> None: """Send e-mail to user.""" class Users(DBModel[User]): tablename = "users" model = User columns = ( "username", "email", "password", ) mutable_columns = ( "username", "email", ) def find_by_username(self, username: str): return self.find_by("username")(username) def create(self, *, username: str, email: str, password: str) -> User: _password = PH.hash(password) return self.insert( {"username": username, "email": email, "password": _password}, ) def login(self, username: str, password: str) -> User | None: if not (u := self.find_by_username(username)): return None try: PH.verify(u.password.get_secret_value(), password) return u except exceptions.VerifyMismatchError: return None
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/db/db.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/db/db.py
from __future__ import annotations import sqlite3 from abc import ABC, abstractmethod from collections.abc import Callable, Iterator, Sequence from contextlib import contextmanager from typing import Annotated, Generic, TypeVar from fastapi import Depends from pydantic import BaseModel as _BaseModel from mvmcryption.environ import getenv DB_PATH = getenv("DB_PATH") def connect_dependency() -> sqlite3.Connection: conn = sqlite3.connect(DB_PATH) conn.row_factory = sqlite3.Row conn.autocommit = True return conn @contextmanager def connect() -> Iterator[sqlite3.Connection]: conn = connect_dependency() try: yield conn finally: conn.close() class BaseModel(_BaseModel): id: int T = TypeVar("T", bound=BaseModel) V = TypeVar("V") class DBModel(ABC, Generic[T]): def __init__(self, conn: sqlite3.Connection) -> None: self.conn = conn @classmethod @property @abstractmethod def tablename(cls) -> str: raise NotImplementedError @classmethod @property @abstractmethod def columns(cls) -> Sequence[str]: raise NotImplementedError @classmethod @property @abstractmethod def mutable_columns(cls) -> Sequence[str]: raise NotImplementedError @classmethod @property @abstractmethod def model(cls) -> type[T]: raise NotImplementedError @classmethod @property def select_query(cls) -> str: return f"SELECT * FROM {cls.tablename} " @classmethod @property def delete_query(cls) -> str: return f"DELETE FROM {cls.tablename} " @classmethod @property def insert_query(cls) -> str: return f"INSERT INTO {cls.tablename} ({', '.join(cls.columns)}) VALUES ({', '.join(f':{col}' for col in cls.columns)}) RETURNING *;" @classmethod @property def update_query(cls) -> str: return f"UPDATE {cls.tablename} SET {', '.join([f'{col} = :{col}' for col in cls.mutable_columns])} " @contextmanager def cur(self) -> Iterator[sqlite3.Cursor]: cur = self.conn.cursor() try: yield cur finally: cur.close() def delete(self, id: int) -> None: return self.delete_by("id")(id) def delete_by(self, lookup: str) -> None: q = self.delete_query + f"WHERE {lookup} = ?;" def _delete_by(value) -> None: with self.cur() as cur: cur.execute(q, [value]) return _delete_by def insert(self, params: dict, **kwargs) -> T: with self.cur() as cur: cur.execute(self.insert_query, params, **kwargs) record = cur.fetchone() return self.model(**record) def update(self, id: int, params: dict) -> T: return self.update_by("id")(id, params) def update_by(self, lookup: str) -> Callable[[dict, ...], T]: if not self.update_query: raise Exception("Model is readonly.") q = self.update_query + f"WHERE {lookup} = :lookup RETURNING *;" def _update_by(value, params: dict, **kwargs) -> T: params["lookup"] = value with self.cur() as cur: cur.execute(q, params, **kwargs) record = cur.fetchone() return self.model(**record) return _update_by def find(self, id: int) -> T | None: return self.find_by("id")(id) def find_by(self, lookup: str) -> Callable[[V], T]: q = self.select_query + f"WHERE {lookup} = :{lookup};" def _find_by(value) -> T | None: with self.cur() as cur: cur.execute(q, [value]) if record := cur.fetchone(): return self.model(**record) return None return _find_by def all(self) -> list[T]: q = self.select_query + ";" with self.cur() as cur: cur.execute(q) return [self.model(**record) for record in cur.fetchall()] @classmethod def dependency(cls, db: Annotated[sqlite3.Connection, Depends(connect_dependency)]): return cls(db)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/db/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/db/__init__.py
from __future__ import annotations from mvmcryption.environ import getenv from .db import connect from .users import Users ADMIN_PASSWORD = getenv("ADMIN_PASSWORD") TABLE_QUERY = """ CREATE TABLE IF NOT EXISTS users ( id INTEGER PRIMARY KEY, username VARCHAR(50) NOT NULL UNIQUE, email VARCHAR(100) NOT NULL UNIQUE, password VARCHAR(100) NOT NULL ); """ def initialize() -> None: with connect() as conn: conn.executescript(TABLE_QUERY) try: Users(conn).create( username="admin", email="admin@this-company-luckily-does-not-exist.mvm", password=ADMIN_PASSWORD, ) except Exception as e: # maybe it already exists print(e) __all__ = [ "Users", "initialize", ]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/routers/users.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/routers/users.py
from typing import Annotated, Literal from fastapi import APIRouter, Depends, HTTPException, Response, status from pydantic import BaseModel, EmailStr from mvmcryption.auth import AuthorizedUser from mvmcryption.db import Users from mvmcryption.resp import PERMISSION_DENIED, not_found from mvmcryption.routers.auth import USERNAME_FIELD users_router = APIRouter(prefix="/users", tags=["users"]) class UpdateBody(BaseModel): username: str = USERNAME_FIELD email: EmailStr @users_router.get("/") def user_list( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], ): if user.is_admin: return users.all() return [user] @users_router.patch("/{user_id}") def update_user( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], body: UpdateBody, ): """Whoa! im updating things!""" if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED if user.id != user_id: user = users.find(user_id) if user.username != body.username and users.find_by("username")(body.username): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Username is not available.", ) email = body.email.lower() if user.email != email and users.find_by("email")(email): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Email is not available.", ) try: return users.update(user.id, dict(username=body.username, email=email)) except Exception: raise HTTPException( status_code=status.HTTP_418_IM_A_TEAPOT, detail="Something went very wrong.", ) @users_router.delete("/{user_id}") def delete_user( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], response: Response, ): if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED users.delete(user_id) response.delete_cookie("mvmcryptionauthtoken", secure=False, httponly=True) response.status_code = status.HTTP_204_NO_CONTENT @users_router.get("/{user_id}") def user_detail( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], ): if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED if record := users.find(user_id): return record raise not_found(Users.model)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/routers/crypto.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/routers/crypto.py
from datetime import datetime from fastapi import APIRouter from pydantic import BaseModel, validator from mvmcryption.auth import ( AuthorizedUser, GlobalECDSA, GlobalRSA, GlobalXSCBCCipher, ) from mvmcryption.environ import getenv from mvmcryption.utils import decode, encode FLAG = getenv("FLAG").encode() crypto_router = APIRouter(prefix="/crypto", tags=["crypto"]) class ValidationBody(BaseModel): ciphertext: str iv: str signature: str debug: bool = False @validator("ciphertext") def validate_ciphertext(v): try: decoded = decode(v) except Exception: msg = "What exactly are you trying to achieve?" raise ValueError(msg) if len(decoded) % 16 != 0: msg = "????" raise ValueError(msg) return v @validator("iv") def validate_iv(v): try: decoded = decode(v) assert len(decoded) == 16 except Exception: msg = "What exactly are you trying to achieve?" raise ValueError(msg) return v @validator("signature") def validate_signature(v): try: decoded = int(v, 16) assert decoded > 1 except Exception: msg = "What exactly are you trying to achieve?" raise ValueError(msg) return v @crypto_router.get("/public-key") def ecdsa_public_key(ecdsa: GlobalECDSA) -> dict: """ECDSA Public Key.""" return ecdsa.pretty_public_key @crypto_router.get("/rsa-public-key") def rsa_public_key(_user: AuthorizedUser, rsa: GlobalRSA) -> dict: """RSA Public Key.""" return { "N": hex(rsa.priv.n), "e": hex(rsa.priv.e), } @crypto_router.post("/decrypt") def decrypt(user: AuthorizedUser, cipher: GlobalXSCBCCipher, body: ValidationBody): """ Real men test in production. - Our CISO, probably """ if body.debug: if not user.is_admin: raise ValueError("no.") try: res = cipher.decrypt( decode(body.ciphertext), int(body.signature, 16), decode(body.iv) ) user.send_email( f"Decryption Results from {datetime.now().isoformat()}", f"Plaintext = {res!r}", ) return {} except Exception as e: if body.debug: return {"err": str(e)} return {} @crypto_router.get("/flag") def flag(user: AuthorizedUser, cipher: GlobalXSCBCCipher): ct, signature = cipher.encrypt(FLAG) return {"ciphertext": encode(ct), "signature": hex(signature)}
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/routers/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/routers/__init__.py
from .auth import auth_router as auth from .crypto import crypto_router as crypto from .users import users_router as users __all__ = [ "auth", "crypto", "users", ]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/routers/auth.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/routers/auth.py
from datetime import UTC, datetime from typing import Annotated from fastapi import APIRouter, Cookie, Depends, HTTPException, Response, status from pydantic import BaseModel, EmailStr, Field from mvmcryption.auth import ( SJWT_TTL, AuthorizedUser, create_sjwt, decode_sjwt, global_sjwt, ) from mvmcryption.crypto.jwt import SJWT from mvmcryption.db.users import Users from mvmcryption.environ import IS_DEV USERNAME_FIELD = Field(max_length=50, min_length=2) PASSWORD_FIELD = Field(max_length=100, min_length=8) class LoginBody(BaseModel): username: str = USERNAME_FIELD password: str = PASSWORD_FIELD class RegisterBody(BaseModel): email: EmailStr username: str = USERNAME_FIELD password: str = PASSWORD_FIELD auth_router = APIRouter(prefix="/auth", tags=["auth"]) @auth_router.get("/status") def user_status( users: Annotated[Users, Depends(Users.dependency)], sjwt: Annotated[SJWT, Depends(global_sjwt)], mvmcryptionauthtoken: Annotated[str | None, Cookie()] = None, ): """Return whether or not user is logged in.""" return {"authorized": bool(decode_sjwt(mvmcryptionauthtoken, sjwt, users))} @auth_router.post("/login") def login( body: LoginBody, response: Response, sjwt: Annotated[SJWT, Depends(global_sjwt)], users: Annotated[Users, Depends(Users.dependency)], ): if not (user := users.login(body.username, body.password)): raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid Credentials.", ) expires = datetime.now(UTC) + SJWT_TTL token = create_sjwt(user, sjwt, expires) response.set_cookie( "mvmcryptionauthtoken", token, expires=expires, secure=not IS_DEV, httponly=True, ) response.status_code = status.HTTP_204_NO_CONTENT @auth_router.post("/register") def register( body: RegisterBody, users: Annotated[Users, Depends(Users.dependency)], ): if users.find_by_username(body.username): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Username is not available.", ) email = body.email.lower() if users.find_by_username(email): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Email is not available.", ) if not ( user := users.create( username=body.username, email=email, password=body.password, ) ): raise HTTPException( status_code=status.HTTP_418_IM_A_TEAPOT, detail="Something went very wrong.", ) return user @auth_router.post("/logout") def logout(response: Response, user: AuthorizedUser): response.delete_cookie("mvmcryptionauthtoken") response.status_code = status.HTTP_204_NO_CONTENT
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/ecdsa.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/ecdsa.py
"""Cryptography stuff.""" from dataclasses import dataclass from hashlib import sha256 from pathlib import Path from random import getrandbits from secrets import randbelow from Crypto.Util.number import bytes_to_long, long_to_bytes from fastecdsa.curve import P256, Curve from fastecdsa.ecdsa import verify from fastecdsa.keys import get_public_key from fastecdsa.point import Point from mvmcryption.utils import decode, encode CURVE = P256 N = CURVE.q def private_key() -> int: f = Path("/etc/ecdsa-private-key") if not f.exists(): privkey = randbelow(N) f.write_text(str(privkey)) privkey = int(f.read_text()) return privkey def generate_nonce(k): """πŸ˜‡πŸ˜‡πŸ˜‡""" return getrandbits(k) def encode_signature(signature: tuple[int, int]) -> str: """Encode signature to following format: `<r.b64>.<s.b64>` """ r = encode(long_to_bytes(signature[0])) s = encode(long_to_bytes(signature[1])) return ".".join([r, s]) def decode_signature(encoded_signature: tuple[str, str]) -> tuple[int, int]: """Decode signature from the following format: `<r.b64>.<s.b64>` """ r = bytes_to_long(decode(encoded_signature[0])) s = bytes_to_long(decode(encoded_signature[1])) return r, s @dataclass class ECDSA: private_key: int curve: Curve = P256 def sign(self, msg: bytes) -> tuple[int, int]: z = int(sha256(msg).hexdigest(), 16) % N k = generate_nonce(128) # πŸ˜‡πŸ˜‡πŸ˜‡ R = k * P256.G r = R.x % N s = (pow(k, -1, N) * (z + r * self.private_key)) % N return (r, s) @property def public_key(self) -> Point: return get_public_key(self.private_key, self.curve) def verify(self, signature: tuple[int, int], msg: bytes) -> bool: return verify(signature, msg, self.public_key, curve=self.curve) @property def pretty_public_key(self) -> dict: return { "curve": { "name": self.curve.name, "G": [hex(self.curve.gx), hex(self.curve.gy)], "p": hex(self.curve.p), "n": hex(self.curve.q), }, "Q": [hex(self.public_key.x), hex(self.public_key.y)], }
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/jwt.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/jwt.py
from dataclasses import dataclass from json import dumps, loads from mvmcryption.utils import decode as b64decode from mvmcryption.utils import encode as b64encode from .ecdsa import ECDSA, decode_signature, encode_signature # SJWT -> Scuffed JSON Web Token; just some extra pain class SJWTError(ValueError): """Error for SJWT things.""" class SJWTEncodingError(SJWTError): """Errors for encoding SJWTs!""" class SJWTDecodeError(SJWTError): """Shit happend while decoding that SJWT!""" class SJWTVerificationError(SJWTError): """That SJWT nasty!""" @dataclass class SJWT: ecdsa: ECDSA def encode(self, payload: dict[str], requires_expiry=True) -> str: if "exp" not in payload and requires_expiry: raise SJWTEncodingError("Sir we need an expiry on the token!") as_string = dumps(payload) _body = as_string.encode() sig = encode_signature(self.ecdsa.sign(_body)) body = b64encode(_body) return body + "." + sig def decode(self, string: str, verify: bool = True) -> dict[str]: parts = string.split(".") if len(parts) != 3: # why even try this >:( raise SJWTDecodeError("WRONG AMOUNT OF parts! parts! >:C") try: body = b64decode(parts[0]) r, s = decode_signature(parts[1:]) except Exception: # JUST STOP IT; THIS IS SECURE!!!!!! >:C raise SJWTDecodeError("Bad token! bad bad bad!") if verify: self._verify(body, (r, s)) try: return loads(body.decode()) except Exception: raise SJWTDecodeError("funny user") def _verify(self, body: bytes, signature: tuple[int, int]) -> None: # raise if payload not satisfactory if not (self.ecdsa.verify(signature, body)): raise SJWTVerificationError(":c stop it")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/rsa.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/rsa.py
from dataclasses import dataclass from secrets import token_bytes from Crypto.Hash import SHA256 from Crypto.Signature.pss import MGF1 from Crypto.Util.number import getPrime, isPrime HASH_LEN = SHA256.digest_size assert HASH_LEN == 32 HASH_BITS = SHA256.digest_size * 8 assert HASH_BITS == 256 def fast_prime(e: int): """ Our CISO mandated we generate primes like this, "apparently" its more efficient and/or faster. (See MVM-7173741 in jira for more on this.) We already told our CISO that we'd lose our ISO 27k1 certification if we did stuff like this, as a result he started laughing. After about 10min of cynical laughter he finally calmed down, and told us: "We lost that certification as soon as we were audited.". """ while True: k = getPrime(int(HASH_BITS * 2 - HASH_LEN * 3.5)) d = pow(e, -1, k) p = 1 + (e * d - 1) // k if isPrime(p): return p, d @dataclass class PrivKey: p: int q: int # See "Customer Retention Strategies" on confluence # dp: int # dq: int e: int @property def phi(self): return (self.p - 1) * (self.q - 1) @property def d(self): return pow(self.e, -1, self.phi) @property def n(self): return self.p * self.q @property def public_key(self): return PubKey(self.n, self.e) @property def u(self): return pow(self.p, -1, self.q) @dataclass class PubKey: n: int e: int def xor(x, y): if len(x) > len(y): x, y = y, x return bytes([x[i] ^ y[i] for i in range(len(x))]) + y[len(x) :] @dataclass class RSA: priv: PrivKey @classmethod def new(cls): n_e = HASH_BITS * 4 e = getPrime(n_e) # See "Customer Retention Strategies" on confluence p, _ = fast_prime(e) q, _ = fast_prime(e) return cls(PrivKey(p, q, e)) def verify(self, m, sig): m_pad = int(pow(int(sig), int(self.priv.e), int(self.priv.n))).to_bytes( HASH_BITS, "big" ) return self.unpad(m_pad) == SHA256.new(m).digest() def unpad(self, m_pad): x, y = m_pad[2:-HASH_LEN], m_pad[-HASH_LEN:] r = xor(y, MGF1(x, HASH_LEN, SHA256)) m = xor(x, MGF1(r, HASH_BITS - HASH_LEN - 2, SHA256)).rstrip(b"\x00") return m[:-1] def pad(self, m): """ This might actually be secure, proving/disproving this is above my paygrade tho. In the end, all i need is $5 anyways. """ m += b"\x01" + b"\x00" * (HASH_BITS - HASH_LEN - 3 - len(m)) r = token_bytes(HASH_LEN) x = xor(m, MGF1(r, HASH_BITS - HASH_LEN - 2, SHA256)) y = xor(r, MGF1(x, HASH_LEN, SHA256)) m_pad = x + y return m_pad def sign(self, m): m = self.pad(SHA256.new(m).digest()) m = int.from_bytes(m, "big") return pow(m, self.priv.d, self.priv.n)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/cipher.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/cipher.py
from dataclasses import dataclass from random import getrandbits from Crypto.Cipher import AES from Crypto.Util.number import long_to_bytes from Crypto.Util.Padding import pad, unpad from pwn import xor from mvmcryption.crypto.rsa import RSA from mvmcryption.utils import chunk BLOCK_SIZE = 16 @dataclass class SCBCCipher: """ Scuffed CBC Cipher. If you're wondering why we aren't using CBC directly, this is part of our "Customer Retention Strategy". """ key: bytes @property def _ecb(self): return AES.new(self.key, AES.MODE_ECB) def encrypt(self, plaintext: bytes, iv: bytes) -> bytes: padded = pad(plaintext, BLOCK_SIZE) enc = [] blocks = chunk(padded) enc.append(self._ecb.encrypt(xor(blocks[0], iv))) for i, block in enumerate(blocks[1:]): enc.append(self._ecb.encrypt(xor(block, enc[i]))) return b"".join(enc) def decrypt(self, ciphertext: bytes, iv: bytes) -> bytes: ndec = chunk(ciphertext) dec = [] dec.append(xor(self._ecb.decrypt(ndec[0]), iv)) for i, block in enumerate(ndec[1:]): dec.append(xor(self._ecb.decrypt(block), ndec[i])) return unpad(b"".join(dec), BLOCK_SIZE) @dataclass class XSCBCCipher(SCBCCipher): """ Extended Scuffed CBC Cipher. The same but with signatures, an (ex)-customer forced us to implement signatures for this after some of their users started abusing bit-flipping to insert commans and semicolons into all sorts of places. Our CISO somehow managed to keep this from going public, the general consesus is that he bribed the customer with some, well all the data, we shouldn't have but do. Ig sometimes stuff just works. See MVM-7173763 in Jira for more on this. """ rsa: RSA def encrypt(self, plaintext: bytes) -> tuple[bytes, int]: iv = long_to_bytes(getrandbits(BLOCK_SIZE * 8), BLOCK_SIZE) ct = super().encrypt(plaintext, iv) signature = self.rsa.sign(iv + ct) # return ct, iv, signature return ct, signature def decrypt(self, ciphertext: bytes, signature: int, iv: bytes) -> bytes: if not self.rsa.verify(iv + ciphertext, signature): raise ValueError("Funny user.") return super().decrypt(ciphertext, iv)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-3/api/mvmcryption/crypto/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/tests/test_ecdsa.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/tests/test_ecdsa.py
import pytest from mvmcryption.crypto.ecdsa import ECDSA, decode_signature, encode_signature @pytest.mark.parametrize("msg", [b"helo", b'{"get pwned": 1337}']) @pytest.mark.parametrize("d", [1337, 895]) def test_ecdsa(msg: bytes, d: int): ecdsa = ECDSA(d) sig = ecdsa.sign(msg) assert ecdsa.verify(sig, msg) @pytest.mark.parametrize("msg", [b"helo", b'{"get pwned": 1337}']) @pytest.mark.parametrize("d", [1337, 895]) def test_ecdsa_signature_encoding_decoding(msg: bytes, d: int): ecdsa = ECDSA(d) sig = ecdsa.sign(msg) encoded_sig = encode_signature(sig) assert ecdsa.verify(decode_signature(encoded_sig.split(".")), msg)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/tests/test_cipher.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/tests/test_cipher.py
from random import getrandbits import pytest from Crypto.Util.number import long_to_bytes from mvmcryption.crypto.cipher import SCBCCipher @pytest.mark.parametrize("msg", [b"helo", b'{"get pwned": 1337}']) @pytest.mark.parametrize("d", [1337, 895]) def test_scbccipher(msg: bytes, d: int): key = long_to_bytes(d, 16) ciph = SCBCCipher(key) iv = long_to_bytes(getrandbits(128), 16) ct = ciph.encrypt(msg, iv) assert ct assert msg == ciph.decrypt(ct, iv)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/tests/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/tests/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/environ.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/environ.py
import os def getenv(key: str) -> str: """Get environment variable and raise an error if it is unset.""" if val := os.getenv(key): return val msg = "ENV variable %s is required!" raise OSError(msg % key) IS_DEV = os.getenv("ENV") == "DEV"
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/utils.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/utils.py
from base64 import urlsafe_b64decode, urlsafe_b64encode def encode(content: bytes | str) -> str: def _encode(): if isinstance(content, str): return urlsafe_b64encode(content.encode()).decode() return urlsafe_b64encode(content).decode() return _encode().replace("=", "") def decode(content: str | bytes) -> bytes: rem = len(content) % 4 if rem > 0: try: content += b"=" * (4 - rem) except Exception: content += "=" * (4 - rem) if isinstance(content, str): return urlsafe_b64decode(content.encode()) return urlsafe_b64decode(content) def chunk(stuff: bytes): """Chunk stuff into 16 byte blocks.""" assert len(stuff) assert len(stuff) % 16 == 0 blocks = [] for i in range(0, len(stuff), 16): blocks.append(stuff[i : i + 16]) return blocks
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/resp.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/resp.py
from __future__ import annotations from fastapi import HTTPException, status PERMISSION_DENIED = HTTPException( status_code=status.HTTP_403_FORBIDDEN, detail="Permission denied.", ) def not_found(model: object) -> HTTPException: return HTTPException( status_code=status.HTTP_404_NOT_FOUND, detail=f"{model.__name__} not found.", )
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/auth.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/auth.py
from __future__ import annotations import json from datetime import UTC, datetime, timedelta from pathlib import Path from secrets import randbits from typing import Annotated from Crypto.Util.number import getPrime, long_to_bytes from fastapi import Cookie, Depends, HTTPException, Response, status from mvmcryption.crypto.cipher import SCBCCipher from mvmcryption.crypto.ecdsa import ECDSA, private_key from mvmcryption.crypto.jwt import SJWT from mvmcryption.db.users import User, Users from mvmcryption.resp import PERMISSION_DENIED SJWT_TTL = timedelta(minutes=15) def global_ecdsa(private_key: Annotated[int, Depends(private_key)]) -> ECDSA: return ECDSA(private_key) def global_sjwt(ecdsa: Annotated[ECDSA, Depends(global_ecdsa)]): return SJWT(ecdsa) def create_sjwt(user: User, sjwt: SJWT, expires: datetime | None = None) -> str: _expires = expires or (datetime.now(UTC) + SJWT_TTL) return sjwt.encode({"sub": user.id, "exp": _expires.isoformat()}) def decode_sjwt(token: str, sjwt: SJWT, users: Users) -> User | None: if not token: return None try: decoded = sjwt.decode(token) except Exception: return None if not ( expiry_str := decoded.get("exp") ): # no expiry -> some token generated by an admin return None # for ~~security~~ budget reasons this is disabled right now # TODO: fix this if not isinstance(expiry_str, str): return None try: expiry = datetime.fromisoformat(expiry_str) except Exception: return None if not expiry or expiry <= datetime.now(UTC): return None user_id = decoded.get("sub") if user_id is None: return None if not isinstance(user_id, int): return None user = users.find(user_id) if user is None: return None return user def authorized_user( users: Annotated[Users, Depends(Users.dependency)], sjwt: Annotated[SJWT, Depends(global_sjwt)], response: Response, mvmcryptionauthtoken: Annotated[str | None, Cookie()] = None, ): user = decode_sjwt(mvmcryptionauthtoken, sjwt, users) if not user: if mvmcryptionauthtoken: response.delete_cookie("mvmcryptionauthtoken") raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Unauthorized.", ) return user def admin_user(user: Annotated[User, Depends(authorized_user)]): if not user.is_admin: raise PERMISSION_DENIED return user def _aes_key() -> bytes: f = Path("/etc/aes-key") if not f.exists(): f.write_bytes(long_to_bytes(randbits(128))) return f.read_bytes() def global_aes(key: Annotated[bytes, Depends(_aes_key)]): return SCBCCipher(key) AuthorizedUser = Annotated[User, Depends(authorized_user)] AdminUser = Annotated[User, Depends(admin_user)] GlobalECDSA = Annotated[ECDSA, Depends(global_ecdsa)] GlobalSCBCCipher = Annotated[SCBCCipher, Depends(global_aes)]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/app.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/app.py
from fastapi import APIRouter, FastAPI from mvmcryption.db import initialize from mvmcryption.environ import IS_DEV from mvmcryption.routers import auth, crypto, users tags_metadata = [ { "name": "users", "description": "Operations with users.", }, { "name": "crypto", "description": "Cryptography stuff.", }, { "name": "auth", "description": "Logout/Login/Register stuff.", }, ] app = FastAPI( title="Much Vulnerable Machine API", description="3AM Crypto chall.", version="dQw4w9WgXcQ", openapi_tags=tags_metadata, ) if IS_DEV: from fastapi.middleware.cors import CORSMiddleware # building a frontend is left as exercise for the player app.add_middleware( CORSMiddleware, allow_origins=[ "http://localhost:5173", "http://localhost:4200", "http://localhost:3000", ], allow_credentials=True, allow_methods=["*"], allow_headers=["*"], ) app.add_event_handler("startup", initialize) api_router = APIRouter(prefix="/api") api_router.include_router(auth) api_router.include_router(crypto) api_router.include_router(users) app.include_router(api_router)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/db/users.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/db/users.py
from __future__ import annotations from argon2 import PasswordHasher, exceptions from pydantic import EmailStr, SecretStr from .db import BaseModel, DBModel PH = PasswordHasher() class User(BaseModel): username: str email: EmailStr password: SecretStr @property def is_admin(self): return self.id == 1 class Users(DBModel[User]): tablename = "users" model = User columns = ( "username", "email", "password", ) mutable_columns = ( "username", "email", ) def find_by_username(self, username: str): return self.find_by("username")(username) def create(self, *, username: str, email: str, password: str) -> User: _password = PH.hash(password) return self.insert( {"username": username, "email": email, "password": _password}, ) def login(self, username: str, password: str) -> User | None: if not (u := self.find_by_username(username)): return None try: PH.verify(u.password.get_secret_value(), password) return u except exceptions.VerifyMismatchError: return None
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/db/db.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/db/db.py
from __future__ import annotations import sqlite3 from abc import ABC, abstractmethod from collections.abc import Callable, Iterator, Sequence from contextlib import contextmanager from typing import Annotated, Generic, TypeVar from fastapi import Depends from pydantic import BaseModel as _BaseModel from mvmcryption.environ import getenv DB_PATH = getenv("DB_PATH") def connect_dependency() -> sqlite3.Connection: conn = sqlite3.connect(DB_PATH) conn.row_factory = sqlite3.Row conn.autocommit = True return conn @contextmanager def connect() -> Iterator[sqlite3.Connection]: conn = connect_dependency() try: yield conn finally: conn.close() class BaseModel(_BaseModel): id: int T = TypeVar("T", bound=BaseModel) V = TypeVar("V") class DBModel(ABC, Generic[T]): def __init__(self, conn: sqlite3.Connection) -> None: self.conn = conn @classmethod @property @abstractmethod def tablename(cls) -> str: raise NotImplementedError @classmethod @property @abstractmethod def columns(cls) -> Sequence[str]: raise NotImplementedError @classmethod @property @abstractmethod def mutable_columns(cls) -> Sequence[str]: raise NotImplementedError @classmethod @property @abstractmethod def model(cls) -> type[T]: raise NotImplementedError @classmethod @property def select_query(cls) -> str: return f"SELECT * FROM {cls.tablename} " @classmethod @property def delete_query(cls) -> str: return f"DELETE FROM {cls.tablename} " @classmethod @property def insert_query(cls) -> str: return f"INSERT INTO {cls.tablename} ({', '.join(cls.columns)}) VALUES ({', '.join(f':{col}' for col in cls.columns)}) RETURNING *;" @classmethod @property def update_query(cls) -> str: return f"UPDATE {cls.tablename} SET {', '.join([f'{col} = :{col}' for col in cls.mutable_columns])} " @contextmanager def cur(self) -> Iterator[sqlite3.Cursor]: cur = self.conn.cursor() try: yield cur finally: cur.close() def delete(self, id: int) -> None: return self.delete_by("id")(id) def delete_by(self, lookup: str) -> None: q = self.delete_query + f"WHERE {lookup} = ?;" def _delete_by(value) -> None: with self.cur() as cur: cur.execute(q, [value]) return _delete_by def insert(self, params: dict, **kwargs) -> T: with self.cur() as cur: cur.execute(self.insert_query, params, **kwargs) record = cur.fetchone() return self.model(**record) def update(self, id: int, params: dict) -> T: return self.update_by("id")(id, params) def update_by(self, lookup: str) -> Callable[[dict, ...], T]: if not self.update_query: raise Exception("Model is readonly.") q = self.update_query + f"WHERE {lookup} = :lookup RETURNING *;" def _update_by(value, params: dict, **kwargs) -> T: params["lookup"] = value with self.cur() as cur: cur.execute(q, params, **kwargs) record = cur.fetchone() return self.model(**record) return _update_by def find(self, id: int) -> T | None: return self.find_by("id")(id) def find_by(self, lookup: str) -> Callable[[V], T]: q = self.select_query + f"WHERE {lookup} = :{lookup};" def _find_by(value) -> T | None: with self.cur() as cur: cur.execute(q, [value]) if record := cur.fetchone(): return self.model(**record) return None return _find_by def all(self) -> list[T]: q = self.select_query + ";" with self.cur() as cur: cur.execute(q) return [self.model(**record) for record in cur.fetchall()] @classmethod def dependency(cls, db: Annotated[sqlite3.Connection, Depends(connect_dependency)]): return cls(db)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/db/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/db/__init__.py
from __future__ import annotations from mvmcryption.environ import getenv from .db import connect from .users import Users ADMIN_PASSWORD = getenv("ADMIN_PASSWORD") TABLE_QUERY = """ CREATE TABLE IF NOT EXISTS users ( id INTEGER PRIMARY KEY, username VARCHAR(50) NOT NULL UNIQUE, email VARCHAR(100) NOT NULL UNIQUE, password VARCHAR(100) NOT NULL ); """ def initialize() -> None: with connect() as conn: conn.executescript(TABLE_QUERY) try: Users(conn).create( username="admin", email="admin@this-company-luckily-does-not-exist.mvm", password=ADMIN_PASSWORD, ) except Exception as e: # maybe it already exists print(e) __all__ = [ "Users", "initialize", ]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/routers/users.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/routers/users.py
from typing import Annotated, Literal from fastapi import APIRouter, Depends, HTTPException, Response, status from pydantic import BaseModel, EmailStr from mvmcryption.auth import AuthorizedUser from mvmcryption.db import Users from mvmcryption.resp import PERMISSION_DENIED, not_found from mvmcryption.routers.auth import USERNAME_FIELD users_router = APIRouter(prefix="/users", tags=["users"]) class UpdateBody(BaseModel): username: str = USERNAME_FIELD email: EmailStr @users_router.get("/") def user_list( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], ): if user.is_admin: return users.all() return [user] @users_router.patch("/{user_id}") def update_user( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], body: UpdateBody, ): """Whoa! im updating things!""" if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED if user.id != user_id: user = users.find(user_id) if user.username != body.username and users.find_by("username")(body.username): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Username is not available.", ) email = body.email.lower() if user.email != email and users.find_by("email")(email): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Email is not available.", ) try: return users.update(user.id, dict(username=body.username, email=email)) except Exception: raise HTTPException( status_code=status.HTTP_418_IM_A_TEAPOT, detail="Something went very wrong.", ) @users_router.delete("/{user_id}") def delete_user( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], response: Response, ): if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED users.delete(user_id) response.delete_cookie("mvmcryptionauthtoken", secure=False, httponly=True) response.status_code = status.HTTP_204_NO_CONTENT @users_router.get("/{user_id}") def user_detail( user: AuthorizedUser, users: Annotated[Users, Depends(Users.dependency)], user_id: int | Literal["me"], ): if user_id == "me": user_id = user.id if user.id != user_id and not user.is_admin: raise PERMISSION_DENIED if record := users.find(user_id): return record raise not_found(Users.model)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/routers/crypto.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/routers/crypto.py
from random import getrandbits from Crypto.Util.number import long_to_bytes from fastapi import APIRouter from pydantic import BaseModel, validator from mvmcryption.auth import ( AdminUser, AuthorizedUser, GlobalECDSA, GlobalSCBCCipher, ) from mvmcryption.environ import getenv from mvmcryption.utils import decode, encode FLAG = getenv("FLAG").encode() crypto_router = APIRouter(prefix="/crypto", tags=["crypto"]) class DecryptionBody(BaseModel): ciphertext: str iv: str @validator("ciphertext") def validate_ciphertext(v): try: decoded = decode(v) except Exception: msg = "What exactly are you trying to achieve?" raise ValueError(msg) if len(decoded) % 16 != 0: msg = "????" raise ValueError(msg) return v @validator("iv") def validate_iv(v): try: decoded = decode(v) assert len(decoded) == 16 except Exception: msg = "What exactly are you trying to achieve?" raise ValueError(msg) return v @crypto_router.get("/public-key") def ecdsa_public_key(ecdsa: GlobalECDSA) -> dict: """ECDSA Public Key.""" return ecdsa.pretty_public_key @crypto_router.post("/decrypt") def decrypt(admin: AdminUser, cipher: GlobalSCBCCipher, body: DecryptionBody): """ Real men test in production. - Our CISO, probably """ try: res = cipher.decrypt(decode(body.ciphertext), decode(body.iv)) return {"plaintext": res.decode()} except Exception as e: return {"err": str(e)} @crypto_router.get("/flag") def flag(user: AuthorizedUser, cipher: GlobalSCBCCipher): iv = long_to_bytes(getrandbits(128), 16) ct = cipher.encrypt(FLAG, iv) return {"ciphertext": encode(ct), "iv": encode(iv)}
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/routers/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/routers/__init__.py
from .auth import auth_router as auth from .crypto import crypto_router as crypto from .users import users_router as users __all__ = [ "auth", "crypto", "users", ]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/routers/auth.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/routers/auth.py
from datetime import UTC, datetime from typing import Annotated from fastapi import APIRouter, Cookie, Depends, HTTPException, Response, status from pydantic import BaseModel, EmailStr, Field from mvmcryption.auth import ( SJWT_TTL, AuthorizedUser, create_sjwt, decode_sjwt, global_sjwt, ) from mvmcryption.crypto.jwt import SJWT from mvmcryption.db.users import Users from mvmcryption.environ import IS_DEV USERNAME_FIELD = Field(max_length=50, min_length=2) PASSWORD_FIELD = Field(max_length=100, min_length=8) class LoginBody(BaseModel): username: str = USERNAME_FIELD password: str = PASSWORD_FIELD class RegisterBody(BaseModel): email: EmailStr username: str = USERNAME_FIELD password: str = PASSWORD_FIELD auth_router = APIRouter(prefix="/auth", tags=["auth"]) @auth_router.get("/status") def user_status( users: Annotated[Users, Depends(Users.dependency)], sjwt: Annotated[SJWT, Depends(global_sjwt)], mvmcryptionauthtoken: Annotated[str | None, Cookie()] = None, ): """Return whether or not user is logged in.""" return {"authorized": bool(decode_sjwt(mvmcryptionauthtoken, sjwt, users))} @auth_router.post("/login") def login( body: LoginBody, response: Response, sjwt: Annotated[SJWT, Depends(global_sjwt)], users: Annotated[Users, Depends(Users.dependency)], ): if not (user := users.login(body.username, body.password)): raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Invalid Credentials.", ) expires = datetime.now(UTC) + SJWT_TTL token = create_sjwt(user, sjwt, expires) response.set_cookie( "mvmcryptionauthtoken", token, expires=expires, secure=not IS_DEV, httponly=True, ) response.status_code = status.HTTP_204_NO_CONTENT @auth_router.post("/register") def register( body: RegisterBody, users: Annotated[Users, Depends(Users.dependency)], ): if users.find_by_username(body.username): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Username is not available.", ) email = body.email.lower() if users.find_by_username(email): raise HTTPException( status_code=status.HTTP_400_BAD_REQUEST, detail="Email is not available.", ) if not ( user := users.create( username=body.username, email=email, password=body.password, ) ): raise HTTPException( status_code=status.HTTP_418_IM_A_TEAPOT, detail="Something went very wrong.", ) return user @auth_router.post("/logout") def logout(response: Response, user: AuthorizedUser): response.delete_cookie("mvmcryptionauthtoken") response.status_code = status.HTTP_204_NO_CONTENT
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/crypto/ecdsa.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/crypto/ecdsa.py
"""Cryptography stuff.""" from dataclasses import dataclass from hashlib import sha256 from pathlib import Path from random import getrandbits from secrets import randbelow from Crypto.Util.number import bytes_to_long, long_to_bytes from fastecdsa.curve import P256, Curve from fastecdsa.ecdsa import verify from fastecdsa.keys import get_public_key from fastecdsa.point import Point from mvmcryption.utils import decode, encode CURVE = P256 N = CURVE.q def private_key() -> int: f = Path("/etc/ecdsa-private-key") if not f.exists(): privkey = randbelow(N) f.write_text(str(privkey)) privkey = int(f.read_text()) return privkey def generate_nonce(k): """πŸ˜‡πŸ˜‡πŸ˜‡""" return getrandbits(k) def encode_signature(signature: tuple[int, int]) -> str: """Encode signature to following format: `<r.b64>.<s.b64>` """ r = encode(long_to_bytes(signature[0])) s = encode(long_to_bytes(signature[1])) return ".".join([r, s]) def decode_signature(encoded_signature: tuple[str, str]) -> tuple[int, int]: """Decode signature from the following format: `<r.b64>.<s.b64>` """ r = bytes_to_long(decode(encoded_signature[0])) s = bytes_to_long(decode(encoded_signature[1])) return r, s @dataclass class ECDSA: private_key: int curve: Curve = P256 def sign(self, msg: bytes) -> tuple[int, int]: z = int(sha256(msg).hexdigest(), 16) % N k = generate_nonce(128) # πŸ˜‡πŸ˜‡πŸ˜‡ R = k * P256.G r = R.x % N s = (pow(k, -1, N) * (z + r * self.private_key)) % N return (r, s) @property def public_key(self) -> Point: return get_public_key(self.private_key, self.curve) def verify(self, signature: tuple[int, int], msg: bytes) -> bool: return verify(signature, msg, self.public_key, curve=self.curve) @property def pretty_public_key(self) -> dict: return { "curve": { "name": self.curve.name, "G": [hex(self.curve.gx), hex(self.curve.gy)], "p": hex(self.curve.p), "n": hex(self.curve.q), }, "Q": [hex(self.public_key.x), hex(self.public_key.y)], }
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/crypto/jwt.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/crypto/jwt.py
from dataclasses import dataclass from json import dumps, loads from mvmcryption.utils import decode as b64decode from mvmcryption.utils import encode as b64encode from .ecdsa import ECDSA, decode_signature, encode_signature # SJWT -> Scuffed JSON Web Token; just some extra pain class SJWTError(ValueError): """Error for SJWT things.""" class SJWTEncodingError(SJWTError): """Errors for encoding SJWTs!""" class SJWTDecodeError(SJWTError): """Shit happend while decoding that SJWT!""" class SJWTVerificationError(SJWTError): """That SJWT nasty!""" @dataclass class SJWT: ecdsa: ECDSA def encode(self, payload: dict[str], requires_expiry=True) -> str: if "exp" not in payload and requires_expiry: raise SJWTEncodingError("Sir we need an expiry on the token!") as_string = dumps(payload) _body = as_string.encode() sig = encode_signature(self.ecdsa.sign(_body)) body = b64encode(_body) return body + "." + sig def decode(self, string: str, verify: bool = True) -> dict[str]: parts = string.split(".") if len(parts) != 3: # why even try this >:( raise SJWTDecodeError("WRONG AMOUNT OF parts! parts! >:C") try: body = b64decode(parts[0]) r, s = decode_signature(parts[1:]) except Exception: # JUST STOP IT; THIS IS SECURE!!!!!! >:C raise SJWTDecodeError("Bad token! bad bad bad!") if verify: self._verify(body, (r, s)) try: return loads(body.decode()) except Exception: raise SJWTDecodeError("funny user") def _verify(self, body: bytes, signature: tuple[int, int]) -> None: # raise if payload not satisfactory if not (self.ecdsa.verify(signature, body)): raise SJWTVerificationError(":c stop it")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/crypto/cipher.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/crypto/cipher.py
from dataclasses import dataclass from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad from pwn import xor from mvmcryption.utils import chunk BLOCK_SIZE = 16 @dataclass class SCBCCipher: """ Scuffed CBC Cipher. If you're wondering why we aren't using CBC directly, this is part of our "Customer Retention Strategy". """ key: bytes @property def _ecb(self): return AES.new(self.key, AES.MODE_ECB) def encrypt(self, plaintext: bytes, iv: bytes) -> bytes: padded = pad(plaintext, BLOCK_SIZE) enc = [] blocks = chunk(padded) enc.append(self._ecb.encrypt(xor(blocks[0], iv))) for i, block in enumerate(blocks[1:]): enc.append(self._ecb.encrypt(xor(block, enc[i]))) return b"".join(enc) def decrypt(self, ciphertext: bytes, iv: bytes) -> bytes: ndec = chunk(ciphertext) dec = [] dec.append(xor(self._ecb.decrypt(ndec[0]), iv)) for i, block in enumerate(ndec[1:]): dec.append(xor(self._ecb.decrypt(block), ndec[i])) return unpad(b"".join(dec), BLOCK_SIZE)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/crypto/__init__.py
ctfs/x3ctf/2025/crypto/much-vulnerable-machine-1/api/mvmcryption/crypto/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/curved-mvm/server.py
ctfs/x3ctf/2025/crypto/curved-mvm/server.py
from sage.all import * import os from json import dumps from secrets import randbits from Crypto.Util.number import bytes_to_long from hashlib import sha1 FLAG = os.getenv("FLAG", "MVM{f4ke_fl4g}") # a wonderful curve p = 0xFFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF a = 0xFFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC b = 0x5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B Gx = 0x6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296 Gy = 0x4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5 F = GF(p) EC = EllipticCurve(F, [a, b]) n = EC.order() SECRET_KEY = bytes_to_long(os.urandom(69420)) % n G = EC([Gx, Gy]) assert G in EC Q = SECRET_KEY * G FUNNY_CREDITS_FOR_FREE_TRIAL = 2 CHALL_NAME = "Curved MVM" K_SIZE = 18 SAMPLE_MSG = "hardcoded cuz reasons" REQUIRED_MSG = "mvm mvm mvm" def sign_msg(msg: str): z = bytes_to_long(sha1(msg.encode()).digest()) % n k = (randbits(K_SIZE) + 2) % n R = k * G r = ZZ(R.x()) % n s = (k.inverse_mod(n) * (z + r * SECRET_KEY)) % n return {"r": hex(r), "s": hex(s)} def sign_bogus(): return sign_msg(SAMPLE_MSG) def verify_signature(r, s, msg): z = bytes_to_long(sha1(msg.encode()).digest()) % n if r < 1 or r >= n or s < 1 or s >= n: return {"error": "funny user uwu"} w = s.inverse_mod(n) u1 = (z * w) % n u2 = (r * w) % n P = u1 * G + u2 * Q should_r = ZZ(P.x()) % n if should_r == r: return {"flag": FLAG} else: # user funny return {"error": "invalid signature"} def mvm(): r = prompt_integer("r") s = prompt_integer("s") try: return verify_signature(r, s, REQUIRED_MSG) except: return {"error": "funny user"} operations = { "sign": sign_bogus, "mvm": mvm, } def prompt_operation(): _prompt = "/".join(operations) prompt = f"({_prompt}): " try: recv = input(prompt) except Exception: print("user too funny, complaints will be ignored\n") if recv not in operations: print("funny operation\n") return prompt_operation() return operations[recv] def prompt_integer(name: str): prompt = f"{name}: " try: recv = input(prompt) except: print("user too funny, complaints will be sent to /dev/null\n") return prompt_integer(name) try: number = int(recv, 16) except: print("user supplied number too funny, complaints will be ignored\n") return prompt_integer(name) if number <= 1: print("user supplied number funny.\n") return prompt_integer(name) return ZZ(number) funny_credits = FUNNY_CREDITS_FOR_FREE_TRIAL if __name__ == "__main__": print(f"Welcome to {CHALL_NAME!r}, enjoy the pain!\n") while True: print( f"You have {funny_credits} funny credit{'s' if funny_credits > 1 else ''}." ) operation = prompt_operation() print(dumps(operation())) funny_credits -= 1 if funny_credits == 0: print("ran out of funny credits, bye") exit() print()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/x3ctf/2025/crypto/curved-mvm/fast.py
ctfs/x3ctf/2025/crypto/curved-mvm/fast.py
import os from json import dumps from secrets import randbits from hashlib import sha1 from fastecdsa.curve import P256 from fastecdsa.point import Point n = P256.q FLAG = os.getenv("FLAG", "MVM{f4ke_fl4g}") SECRET_KEY = int.from_bytes(os.urandom(69420)) % n Q = SECRET_KEY * P256.G FUNNY_CREDITS_FOR_FREE_TRIAL = 2 CHALL_NAME = "Curved MVM" K_SIZE = 18 SAMPLE_MSG = "hardcoded cuz reasons" REQUIRED_MSG = "mvm mvm mvm" def sign_msg(msg: str): z = int.from_bytes(sha1(msg.encode()).digest()) % n k = (randbits(K_SIZE) + 2) % n R = k * P256.G r = R.x % n s = (pow(k, -1, n) * (z + r * SECRET_KEY)) % n return {"r": hex(r), "s": hex(s)} def sign_bogus(): return sign_msg(SAMPLE_MSG) def verify_signature(r, s, msg): z = int.from_bytes(sha1(msg.encode()).digest()) % n if r < 1 or r >= n or s < 1 or s >= n: return {"error": "funny user uwu"} w = pow(s, -1, n) u1 = (z * w) % n u2 = (r * w) % n P = u1 * P256.G + u2 * Q should_r = P.x % n if should_r == r: return {"flag": FLAG} else: # user funny return {"error": "invalid signature"} def mvm(): r = prompt_integer("r") s = prompt_integer("s") try: return verify_signature(r, s, REQUIRED_MSG) except: return {"error": "funny user"} operations = { "sign": sign_bogus, "mvm": mvm, } def prompt_operation(): _prompt = "/".join(operations) prompt = f"({_prompt}): " try: recv = input(prompt) except Exception: print("user too funny, complaints will be ignored\n") if recv not in operations: print("funny operation\n") return prompt_operation() return operations[recv] def prompt_integer(name: str): prompt = f"{name}: " try: recv = input(prompt) except: print("user too funny, complaints will be sent to /dev/null\n") return prompt_integer(name) try: number = int(recv, 16) except: print("user supplied number too funny, complaints will be ignored\n") return prompt_integer(name) if number <= 1: print("user supplied number funny.\n") return prompt_integer(name) return number funny_credits = FUNNY_CREDITS_FOR_FREE_TRIAL if __name__ == "__main__": print(f"Welcome to {CHALL_NAME!r}, enjoy the pain!\n") while True: print( f"You have {funny_credits} funny credit{'s' if funny_credits > 1 else ''}." ) operation = prompt_operation() print(dumps(operation())) funny_credits -= 1 if funny_credits == 0: print("ran out of funny credits, bye") exit() print()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Mapna/2024/pwn/U2S/stuff/run.py
ctfs/Mapna/2024/pwn/U2S/stuff/run.py
#!/usr/bin/env python3 import tempfile import pathlib import os import re import json import time import signal import re if not os.path.exists('/tmp/ips.json'): f = open('/tmp/ips.json','w') f.write('{}') f.close() ipFile = open('/tmp/ips.json','r+') peerIp = os.environ['SOCAT_PEERADDR'] ips = {} ips = json.loads(ipFile.read()) if(peerIp in ips): if(time.time() > ips[peerIp]): ips[peerIp] = int(time.time())+5 else: print('one try every 5 seconds') exit(0) else: ips[peerIp] = int(time.time())+5 ipFile.seek(0) ipFile.write(json.dumps(ips)) ipFile.close() os.chdir(pathlib.Path(__file__).parent.resolve()) signal.alarm(10) os.setgid(1000) os.setuid(1000) with tempfile.NamedTemporaryFile() as tmp: print('Send the file: (ended with "\\n-- EOF --\\n"):') s = input() while(re.match('^[\x09-\x7f]*$',s) and s != '-- EOF --' and len(s) < 1024*1024): tmp.write((s+'\n').encode()) s = input() tmp.flush() os.close(0) os.system('timeout 3 ./lua ' + tmp.name)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Mapna/2024/pwn/Protector/generate_directory_tree.py
ctfs/Mapna/2024/pwn/Protector/generate_directory_tree.py
import os import random import string flag = "MAPNA{placeholder_for_flag}" MIN_NAME_LENGTH = 8 MAX_NAME_LENGTH = 16 FILES_COUNT = 0x100 def get_random_name(): n = random.randint(MIN_NAME_LENGTH, MAX_NAME_LENGTH) return "".join(random.choice(string.ascii_letters + string.digits) for i in range(n)) def generate_files(): files = [get_random_name() for i in range(FILES_COUNT)] real_flag_file = random.choice(files) for filepath in files: if filepath == real_flag_file: continue with open(filepath, "w") as f: pass with open(real_flag_file, "w") as f: f.write(flag) def main(): os.mkdir("maze") os.chdir("maze") generate_files() if __name__ == "__main__": main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Mapna/2024/crypto/What_next_II/what_next_ii.py
ctfs/Mapna/2024/crypto/What_next_II/what_next_ii.py
#!/usr/bin/env python3 from random import * from Crypto.Util.number import * from flag import flag def encrypt(msg, KEY): m = bytes_to_long(msg) c = KEY ^ m return c n = 80 TMP = [getrandbits(256) * _ ** 2 for _ in range(n)] KEY = sum([getrandbits(256 >> _) ** 2 for _ in range(8)]) enc = encrypt(flag, KEY) print(f'TMP = {TMP}') print(f'enc = {enc}')
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Mapna/2024/crypto/Be_Fast/be_fast.py
ctfs/Mapna/2024/crypto/Be_Fast/be_fast.py
#!/usr/bin/env python3 from random import * from binascii import * from Crypto.Cipher import DES from signal import * import sys, os from flag import flag def die(*args): pr(*args) quit() def pr(*args): s = " ".join(map(str, args)) sys.stdout.write(s + "\n") sys.stdout.flush() def sc(): return sys.stdin.buffer.readline() def shift(msg, l): assert l < len(msg) return msg[l:] + msg[:l] def pad(text): if len(text) % 8 != 0: text += (b'\xff' * (8 - len(text) % 8)) return text def encrypt(msg, key): msg = pad(msg) assert len(msg) % 8 == 0 assert len(key) == 8 des = DES.new(key, DES.MODE_ECB) enc = des.encrypt(msg) return enc def main(): border = "+" pr(border*72) pr(border, ".:: Hi all, you should be fast, I mean super fact!! ::.", border) pr(border, "You should send twenty 8-byte keys to encrypt the secret message and", border) pr(border, "just decrypt the ciphertext to get the flag, Are you ready to start?", border) pr(border*72) secret_msg = b'TOP_SECRET:' + os.urandom(40) cnt, STEP, KEYS = 0, 14, [] md = 1 while True: pr(border, "please send your key as hex: ") alarm(md + 1) ans = sc().decode().strip() alarm(0) try: key = unhexlify(ans) if len(key) == 8 and key not in KEYS: KEYS += [key] cnt += 1 else: die(border, 'Kidding me!? Bye!!') except: die(border, 'Your key is not valid! Bye!!') if len(KEYS) == STEP: print(KEYS) HKEY = KEYS[:7] shuffle(HKEY) NKEY = KEYS[-7:] shuffle(NKEY) for h in HKEY: NKEY = [key, shift(key, 1)] + NKEY enc = encrypt(secret_msg, NKEY[0]) for key in NKEY[1:]: enc = encrypt(enc, key) pr(border, f'enc = {hexlify(enc)}') pr(border, f'Can you guess the secret message? ') alarm(md + 1) msg = sc().strip() alarm(0) if msg == hexlify(secret_msg): die(border, f'Congrats, you deserve the flag: {flag}') else: die(border, f'Sorry, your input is incorrect! Bye!!') if __name__ == '__main__': main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Mapna/2024/crypto/Shibs/shibs.py
ctfs/Mapna/2024/crypto/Shibs/shibs.py
#!/usr/bin/env python3 from Crypto.Util.number import * from flag import flag def shift(s, B): assert s < len(B) return B[s:] + B[:s] def gen_key(nbit): while True: p = getPrime(nbit) B = bin(p)[2:] for s in range(1, nbit): q = int(shift(s, B), 2) if isPrime(q): n = p * q return n, p, s nbit = 1024 n, p, _ = gen_key(nbit) q = n // p dna = p & q m = bytes_to_long(flag) c = pow(m, 65537, n) print(f'n = {n}') print(f'dna = {dna}') print(f'enc = {c}')
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Mapna/2024/crypto/What_next/what_next.py
ctfs/Mapna/2024/crypto/What_next/what_next.py
#!/usr/bin/env python3 from random import * from Crypto.Util.number import * from flag import flag def encrypt(msg, KEY): m = bytes_to_long(msg) c = KEY ^ m return c n = 80 TMP = [getrandbits(256) * _ ** 2 for _ in range(n)] KEY = sum([getrandbits(256 >> _) for _ in range(8)]) enc = encrypt(flag, KEY) print(f'TMP = {TMP}') print(f'KEY = {KEY}') print(f'enc = {enc}')
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Mapna/2024/web/Novel_reader/stuff/main.py
ctfs/Mapna/2024/web/Novel_reader/stuff/main.py
from flask import * from urllib.parse import unquote import os def readFile(path): f = open(path,'r') buf = f.read(0x1000) f.close() return buf app = Flask(__name__,static_folder='./static') app.secret_key = 'REDACTED' indexFile = readFile('index.html') @app.before_request def init_session(): if('credit' not in session): session['credit'] = 100 session['words_balance'] = 1 @app.get('/') def index(): return indexFile @app.get('/api/stats') def getStats(): return {'credit': session['credit'], 'words_balance': session['words_balance']} @app.post('/api/charge') def buyWord(): nwords = request.args.get('nwords') if(nwords): nwords = int(nwords[:10]) price = nwords * 10 if(price <= session['credit']): session['credit'] -= price session['words_balance'] += nwords return {'success': True, 'msg': 'Added to your account!'} return {'success': False, 'msg': 'Not enough credit.'}, 402 else: return {'success': False, 'msg': 'Missing parameteres.'}, 400 @app.get('/api/read/<path:name>') def readNovel(name): name = unquote(name) if(not name.startswith('public/')): return {'success': False, 'msg': 'You can only read public novels!'}, 400 buf = readFile(name).split(' ') buf = ' '.join(buf[0:session['words_balance']])+'... Charge your account to unlock more of the novel!' return {'success': True, 'msg': buf} @app.get('/api/list-public-novels') def listPublicNovels(): return os.listdir('./public/') @app.get('/api/list-private-novels') def listPrivateNovels(): return os.listdir('./private/') if(__name__ == '__main__'): app.run('0.0.0.0',port=8000)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2018/Quals/7amebox1/_7amebox.py
ctfs/Codegate/2018/Quals/7amebox1/_7amebox.py
#!/usr/bin/python import random import signal import sys PERM_MAPPED = 0b1000 PERM_READ = 0b0100 PERM_WRITE = 0b0010 PERM_EXEC = 0b0001 TYPE_R = 0 TYPE_I = 1 FLAG_NF = 0b0010 FLAG_ZF = 0b0001 CODE_DEFAULT_BASE = 0x00000 STACK_DEFAULT_BASE = 0xf4000 class Stdin: def read(self, size): res = '' buf = sys.stdin.readline(size) for ch in buf: if ord(ch) > 0b1111111: break if ch == '\n': res += ch break res += ch return res def write(self, data): return None class Stdout: def read(self, size): return None def write(self, data): out = ''.join(map(chr, data)) sys.stdout.write(out) sys.stdout.flush() return len(out) class Register: def __init__(self): self.register = {} self.register_list = ['r0', 'r1', 'r2', 'r3', 'r4', 'r5', 'r6', 'r7','r8', 'r9', 'r10', 'bp', 'sp', 'pc', 'eflags', 'zero'] def init_register(self): for reg_name in self.register_list: self.register[reg_name] = 0 def set_register(self, reg, value): if isinstance(reg, (int, long)) : if reg < len(self.register_list): reg = self.register_list[reg] else: self.terminate("[VM] Invalid register") elif reg not in self.register: self.terminate("[VM] Invalid register") self.register[reg] = value def get_register(self, reg): if isinstance(reg, (int, long)) : if reg < len(self.register_list): reg = self.register_list[reg] else: self.terminate("[VM] Invalid register") elif reg not in self.register: self.terminate("[VM] Invalid register") return self.register[reg] class FileSystem: def __init__(self): self.files = {} def load_file(self, filename): with open(filename, 'rb') as f: self.files[filename] = f.read() def open(self, filename): if filename in self.files: fd = File() fd.set_buffer(self.files[filename]) return fd else: return -1 class File: def __init__(self): self.buffer = '' self.pos = 0 self.size = 0 def set_buffer(self, data): self.buffer = data self.size = len(self.buffer) def read(self, size): res = '' if self.pos >= self.size: return '' if self.pos + size >= len(self.buffer): res += self.buffer[self.pos : ] self.pos = len(self.buffer) else: res += self.buffer[self.pos : self.pos+size] self.pos += size return res def write(self, data): return None class Memory: def __init__(self, size): self.memory = [0 for i in range(size)] self.pages = {} for page in range(0, size, 0x1000): self.pages[page] = 0 def __getitem__(self, key): return self.memory[key] def __setitem__(self, key, val): self.memory[key] = val def get_perm(self, addr): if (addr & 0b111111111000000000000) not in self.pages: return 0 else: return self.pages[addr & 0b111111111000000000000] def set_perm(self, addr, perm): self.pages[addr & 0b111111111000000000000] = perm & 0b1111 def allocate(self, new_perm, addr=None): if addr: if not (self.get_perm(addr) & PERM_MAPPED): self.set_perm(addr, (PERM_MAPPED | new_perm) & 0b1111) return addr else: return -1 for page, perm in self.pages.items(): if not (self.get_perm(page) & PERM_MAPPED): self.set_perm(page, (PERM_MAPPED | new_perm) & 0b1111) return page return -1 def check_permission(self, addr, perm): if self.get_perm(addr) & (PERM_MAPPED | perm): return True else: return False class EMU: def __init__(self): self.config = {'NX':False} self.firmware = None self.is_load = False self.register = Register() self.register.init_register() self.pipeline = [] self.memory = Memory(2 ** 20) self.checkperm = [] self.filesystem = FileSystem() self.syscall_table = [self.sys_s0, self.sys_s1, self.sys_s2, self.sys_s3, self.sys_s4, self.sys_s5] self.op_hander_table = [self.op_x0, self.op_x1, self.op_x2, self.op_x3, self.op_x4, self.op_x5, self.op_x6, self.op_x7, self.op_x8, self.op_x9, self.op_x10, self.op_x11, self.op_x12, self.op_x13, self.op_x14, self.op_x15, self.op_x16, self.op_x17, self.op_x18, self.op_x19, self.op_x20, self.op_x21, self.op_x22, self.op_x23, self.op_x24, self.op_x25, self.op_x26, self.op_x27, self.op_x28, self.op_x29, self.op_x30] def set_timeout(self, timeout = 30): def handler(signum, frame): print 'timeout!' exit(-1) signal.signal(signal.SIGALRM, handler) signal.alarm(timeout) def set_mitigation(self, nx=False): if nx: self.config['NX'] = nx def init_pipeline(self): self.pipeline.append(Stdin()) self.pipeline.append(Stdout()) def load_firmware(self, firm_name): try: with open(firm_name, 'rb') as f: data = f.read() self.firmware = [ord(byte) for byte in data] self.is_load = True if self.config['NX']: stack_perm = PERM_READ | PERM_WRITE else: stack_perm = PERM_READ | PERM_WRITE | PERM_EXEC for i in range(0, len(data) / 0x1000 + 1): self.memory.allocate(PERM_READ | PERM_WRITE | PERM_EXEC, addr=CODE_DEFAULT_BASE + i*0x1000) self.write_memory(CODE_DEFAULT_BASE, self.firmware, len(self.firmware)) for i in range(0, len(data) / 0x1000 + 1): self.memory.set_perm(CODE_DEFAULT_BASE + i*0x1000, PERM_MAPPED | PERM_READ | PERM_EXEC) self.memory.allocate(stack_perm, addr=STACK_DEFAULT_BASE) self.memory.allocate(stack_perm, addr=STACK_DEFAULT_BASE + 0x1000) self.register.set_register('pc', CODE_DEFAULT_BASE) self.register.set_register('sp', STACK_DEFAULT_BASE+0x1fe0) except: self.terminate("[VM] Firmware load error") def bit_concat(self, bit_list): res = 0 for bit in bit_list: res <<= 7 res += bit & 0b1111111 return res def execute(self): try: while 1: cur_pc = self.register.get_register('pc') op, op_type, opers, op_size = self.dispatch(cur_pc) if not self.memory.check_permission(cur_pc, PERM_EXEC) or not self.memory.check_permission(cur_pc + op_size - 1, PERM_EXEC): self.terminate("[VM] Can't exec memory") self.register.set_register('pc', cur_pc + op_size) op_handler = self.op_hander_table[op] op_handler(op_type, opers) except: self.terminate("[VM] Unknown error") def dispatch(self, addr): opcode = self.bit_concat(self.read_memory(addr, 2)) op = (opcode & 0b11111000000000) >> 9 if op >= len(self.op_hander_table): self.terminate("[VM] Invalid instruction") op_type = (opcode & 0b00000100000000) >> 8 opers = [] if op_type == TYPE_R: opers.append((opcode & 0b00000011110000) >> 4) opers.append((opcode & 0b00000000001111)) op_size = 2 elif op_type == TYPE_I: opers.append((opcode & 0b00000011110000) >> 4) opers.append(self.read_memory_tri(addr+2, 1)[0]) op_size = 5 else: self.terminate("[VM] Invalid instruction") return op, op_type, opers, op_size def read_memory(self, addr, length): if not length: return [] if self.memory.check_permission(addr, PERM_READ) and self.memory.check_permission(addr + length - 1, PERM_READ): res = self.memory[addr : addr + length] return res else: self.terminate("[VM] Can't read memory") def read_memory_str(self, addr): res = [] length = 0 while 0 not in res: res.append(self.memory[addr + length]) length += 1 res = res[:-1] length -= 1 if not length: return '', 0 if self.memory.check_permission(addr, PERM_READ) and self.memory.check_permission(addr + length - 1, PERM_READ): return ''.join(map(chr,res)), length else: self.terminate("[VM] Can't read memory") def read_memory_tri(self, addr, count): if not count: return [] if self.memory.check_permission(addr, PERM_READ) and self.memory.check_permission(addr + count*3 - 1, PERM_READ): res = [] for i in range(count): tri = 0 tri |= self.memory[addr + i*3] tri |= self.memory[addr + i*3 + 1] << 14 tri |= self.memory[addr + i*3 + 2] << 7 res.append(tri) return res else: self.terminate("[VM] Can't read memory") def write_memory(self, addr, data, length): if not length: return if self.memory.check_permission(addr, PERM_WRITE) and self.memory.check_permission(addr + length - 1, PERM_WRITE): for offset in range(length): self.memory[addr + offset] = data[offset] & 0b1111111 else: self.terminate("[VM] Can't write memory") def write_memory_tri(self,addr,data_list, count): if not count: return if self.memory.check_permission(addr, PERM_WRITE) and self.memory.check_permission(addr + count*3 - 1, PERM_WRITE): for i in range(count): self.memory[addr + i*3] = (data_list[i] & 0b000000000000001111111) self.memory[addr + i*3 + 1] = (data_list[i] & 0b111111100000000000000) >> 14 self.memory[addr + i*3 + 2] = (data_list[i] & 0b000000011111110000000) >> 7 else: self.terminate("[VM] Can't write memory") def op_x0(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] data = self.read_memory_tri(src, 1)[0] self.register.set_register(dst, data) else: self.terminate("[VM] Invalid instruction") def op_x1(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] ch = self.read_memory(src, 1)[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ch) else: self.terminate("[VM] Invalid instruction") def op_x2(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[0]) dst = self.register.get_register(opers[1]) self.write_memory_tri(dst, [src], 1) else: self.terminate("[VM] Invalid instruction") def op_x3(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[0]) dst = self.register.get_register(opers[1]) self.write_memory(dst, [src & 0b1111111], 1) else: self.terminate("[VM] Invalid instruction") def op_x4(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] self.register.set_register(dst, src) elif op_type == TYPE_I: src = opers[1] dst = opers[0] self.register.set_register(dst, src) else: self.terminate("[VM] Invalid instruction") def op_x5(self, op_type, opers): if op_type == TYPE_R: src = opers[1] dst = opers[0] org_src = self.register.get_register(src) org_dst = self.register.get_register(dst) self.register.set_register(src, org_dst) self.register.set_register(dst, org_src) else: self.terminate("[VM] Invalid instruction") def op_x6(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[0]) sp = self.register.get_register('sp') self.register.set_register('sp', sp-3) self.write_memory_tri(sp-3, [src], 1) elif op_type == TYPE_I: src = opers[1] sp = self.register.get_register('sp') self.register.set_register('sp', sp-3) self.write_memory_tri(sp-3, [src], 1) else: self.terminate("[VM] Invalid instruction") def op_x7(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] sp = self.register.get_register('sp') value = self.read_memory_tri(sp, 1)[0] self.register.set_register(dst, value) self.register.set_register('sp', sp+3) else: self.terminate("[VM] Invalid instruction") def op_x9(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst + src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst + src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x10(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) & 0b1111111 dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ((org_dst + src) & 0b1111111)) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ((org_dst + src) & 0b1111111)) else: self.terminate("[VM] Invalid instruction") def op_x11(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst - src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst - src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x12(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) & 0b1111111 dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ((org_dst - src) & 0b1111111)) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ((org_dst - src) & 0b1111111)) else: self.terminate("[VM] Invalid instruction") def op_x13(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] value = self.register.get_register(opers[1]) org_dst = self.register.get_register(dst) self.register.set_register(dst, org_dst >> value) elif op_type == TYPE_I: dst = opers[0] value = opers[1] org_dst = self.register.get_register(dst) self.register.set_register(dst, org_dst >> value) else: self.terminate("[VM] Invalid instruction") def op_x14(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] value = self.register.get_register(opers[1]) org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst << value) & 0b111111111111111111111) elif op_type == TYPE_I: dst = opers[0] value = opers[1] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst << value) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x15(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] value = self.register.get_register(opers[1]) org_dst = self.register.get_register(dst) self.register.set_register(dst, ((org_dst * value) & 0b111111111111111111111)) elif op_type == TYPE_I: dst = opers[0] value = opers[1] org_dst = self.register.get_register(dst) self.register.set_register(dst, ((org_dst * value) & 0b111111111111111111111)) else: self.terminate("[VM] Invalid instruction") def op_x16(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] value = self.register.get_register(opers[1]) if value == 0: self.terminate("[VM] Divide by zero") org_dst = self.register.get_register(dst) self.register.set_register(dst, (int(org_dst / value) & 0b111111111111111111111)) elif op_type == TYPE_I: dst = opers[0] value = opers[1] if value == 0: self.terminate("[VM] Divide by zero") org_dst = self.register.get_register(dst) self.register.set_register(dst, (int(org_dst / value) & 0b111111111111111111111)) else: self.terminate("[VM] Invalid instruction") def op_x17(self, op_type, opers): if op_type == TYPE_R: src = opers[0] value = self.register.get_register(src) value += 1 self.register.set_register(src, value) else: self.terminate("[VM] Invalid instruction") def op_x18(self, op_type, opers): if op_type == TYPE_R: src = opers[0] value = self.register.get_register(src) value -= 1 self.register.set_register(src, value) else: self.terminate("[VM] Invalid instruction") def op_x19(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x20(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst | src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst | src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x21(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst ^ src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst ^ src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x22(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst % src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst % src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x23(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = self.register.get_register(opers[0]) tmp = dst - src if tmp == 0: eflags = FLAG_ZF elif tmp < 0: eflags = FLAG_NF else: eflags = 0b0000 self.register.set_register('eflags', eflags & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = self.register.get_register(opers[0]) tmp = dst - src if tmp == 0: eflags = FLAG_ZF elif tmp < 0: eflags = FLAG_NF else: eflags = 0b0000 self.register.set_register('eflags', eflags & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x24(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) & 0b000000000000001111111 dst = self.register.get_register(opers[0]) & 0b000000000000001111111 tmp = dst - src if tmp == 0: eflags = FLAG_ZF elif tmp < 0: eflags = FLAG_NF else: eflags = 0b0000 self.register.set_register('eflags', eflags & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] & 0b000000000000001111111 dst = self.register.get_register(opers[0]) & 0b000000000000001111111 tmp = dst - src if tmp == 0: eflags = FLAG_ZF elif tmp < 0: eflags = FLAG_NF else: eflags = 0b0000 self.register.set_register('eflags', eflags & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x25(self, op_type, opers): if op_type == TYPE_R: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) if not (eflags & FLAG_NF) and not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = opers[1] if not (eflags & FLAG_NF) and not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x26(self, op_type, opers): if op_type == TYPE_R: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) if (eflags & FLAG_NF) and not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = opers[1] if (eflags & FLAG_NF) and not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x27(self, op_type, opers): if op_type == TYPE_R: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) if (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = opers[1] if (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x28(self, op_type, opers): if op_type == TYPE_R: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) if not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = opers[1] if not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x29(self, op_type, opers): if op_type == TYPE_R: base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: base = self.register.get_register(opers[0]) offset = opers[1] self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x30(self, op_type, opers): if op_type == TYPE_R: base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) ret_addr = self.register.get_register('pc') self.op_x6(1, [0, ret_addr]) self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: base = self.register.get_register(opers[0]) offset = opers[1] ret_addr = self.register.get_register('pc') self.op_x6(1, [0, ret_addr]) self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x8(self, op_type, opers): syscall_num = self.register.get_register('r0') if 0 <= syscall_num < len(self.syscall_table): syscall = self.syscall_table[syscall_num] syscall() else: self.terminate("[VM] Invalid syscall") def sys_s0(self): exit(0) def sys_s1(self): filename, filename_len = self.read_memory_str(self.register.get_register('r1')) fd = self.filesystem.open(filename) if fd != -1: self.pipeline.append(fd) self.register.set_register('r0', len(self.pipeline) - 1) else: self.register.set_register('r0', 0b111111111111111111111) def sys_s2(self): fd = self.register.get_register('r1') buf = self.register.get_register('r2') size = self.register.get_register('r3') data = self.read_memory(buf, size) if 0 <= fd < len(self.pipeline): self.pipeline[fd].write(data) self.register.set_register('r0', size) else: self.register.set_register('r0', 0) def sys_s3(self): fd = self.register.get_register('r1') buf = self.register.get_register('r2') size = self.register.get_register('r3') if 0 <= fd < len(self.pipeline): data = map(ord, self.pipeline[fd].read(size)) self.write_memory(buf, data, len(data)) self.register.set_register('r0', len(data) & 0b111111111111111111111) else: self.register.set_register('r0', 0) def sys_s4(self): res_ptr = self.register.get_register('r1') perm = self.register.get_register('r2') addr = self.memory.allocate(perm) if addr != -1: self.write_memory_tri(res_ptr, [addr], 1) self.register.set_register('r0', 1) else: self.register.set_register('r0', 0) def sys_s5(self): self.register.set_register('r0', random.randrange(0, 2**21-1)) def terminate(self, msg): print msg exit(-1)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2018/Quals/7amebox1/vm_name.py
ctfs/Codegate/2018/Quals/7amebox1/vm_name.py
#!/usr/bin/python import string import random import _7amebox from hashlib import sha1 # proof of work print """ ------------------------------------------------------------------------------------ if not (answer.startswith(prefix) and sha1(answer).hexdigest().endswith('000000')): print 'nope' exit(-1) ------------------------------------------------------------------------------------ """ prefix = ''.join(random.sample(string.letters + string.digits, 6)) print 'prefix : {}'.format(prefix) answer = raw_input('answer : ') if not (answer.startswith(prefix) and sha1(answer).hexdigest().endswith('000000')): print 'nope' exit(-1) firmware = 'mic_check.firm' emu = _7amebox.EMU() emu.filesystem.load_file('flag') emu.register.init_register() emu.init_pipeline() emu.load_firmware(firmware) emu.set_timeout(30) emu.execute()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2018/Quals/7amebox2/vm_adventure.py
ctfs/Codegate/2018/Quals/7amebox2/vm_adventure.py
#!/usr/bin/python import string import random import _7amebox from hashlib import sha1 # proof of work print """ ------------------------------------------------------------------------------------ if not (answer.startswith(prefix) and sha1(answer).hexdigest().endswith('000000')): print 'nope' exit(-1) ------------------------------------------------------------------------------------ """ prefix = ''.join(random.sample(string.letters + string.digits, 6)) print 'prefix : {}'.format(prefix) answer = raw_input('answer : ') if not (answer.startswith(prefix) and sha1(answer).hexdigest().endswith('000000')): print 'nope' exit(-1) firmware = 'pwn_adventure.firm' emu = _7amebox.EMU() emu.filesystem.load_file('flag') for i in range(0, 8): emu.filesystem.load_file('stage_{}.map'.format(i)) emu.register.init_register() emu.init_pipeline() emu.load_firmware(firmware) emu.set_mitigation(nx=True) emu.set_timeout(360) emu.execute()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2018/Quals/7amebox2/_7amebox.py
ctfs/Codegate/2018/Quals/7amebox2/_7amebox.py
#!/usr/bin/python import random import signal import sys PERM_MAPPED = 0b1000 PERM_READ = 0b0100 PERM_WRITE = 0b0010 PERM_EXEC = 0b0001 TYPE_R = 0 TYPE_I = 1 FLAG_NF = 0b0010 FLAG_ZF = 0b0001 CODE_DEFAULT_BASE = 0x00000 STACK_DEFAULT_BASE = 0xf4000 class Stdin: def read(self, size): res = '' buf = sys.stdin.readline(size) for ch in buf: if ord(ch) > 0b1111111: break if ch == '\n': res += ch break res += ch return res def write(self, data): return None class Stdout: def read(self, size): return None def write(self, data): out = ''.join(map(chr, data)) sys.stdout.write(out) sys.stdout.flush() return len(out) class Register: def __init__(self): self.register = {} self.register_list = ['r0', 'r1', 'r2', 'r3', 'r4', 'r5', 'r6', 'r7','r8', 'r9', 'r10', 'bp', 'sp', 'pc', 'eflags', 'zero'] def init_register(self): for reg_name in self.register_list: self.register[reg_name] = 0 def set_register(self, reg, value): if isinstance(reg, (int, long)) : if reg < len(self.register_list): reg = self.register_list[reg] else: self.terminate("[VM] Invalid register") elif reg not in self.register: self.terminate("[VM] Invalid register") self.register[reg] = value def get_register(self, reg): if isinstance(reg, (int, long)) : if reg < len(self.register_list): reg = self.register_list[reg] else: self.terminate("[VM] Invalid register") elif reg not in self.register: self.terminate("[VM] Invalid register") return self.register[reg] class FileSystem: def __init__(self): self.files = {} def load_file(self, filename): with open(filename, 'rb') as f: self.files[filename] = f.read() def open(self, filename): if filename in self.files: fd = File() fd.set_buffer(self.files[filename]) return fd else: return -1 class File: def __init__(self): self.buffer = '' self.pos = 0 self.size = 0 def set_buffer(self, data): self.buffer = data self.size = len(self.buffer) def read(self, size): res = '' if self.pos >= self.size: return '' if self.pos + size >= len(self.buffer): res += self.buffer[self.pos : ] self.pos = len(self.buffer) else: res += self.buffer[self.pos : self.pos+size] self.pos += size return res def write(self, data): return None class Memory: def __init__(self, size): self.memory = [0 for i in range(size)] self.pages = {} for page in range(0, size, 0x1000): self.pages[page] = 0 def __getitem__(self, key): return self.memory[key] def __setitem__(self, key, val): self.memory[key] = val def get_perm(self, addr): if (addr & 0b111111111000000000000) not in self.pages: return 0 else: return self.pages[addr & 0b111111111000000000000] def set_perm(self, addr, perm): self.pages[addr & 0b111111111000000000000] = perm & 0b1111 def allocate(self, new_perm, addr=None): if addr: if not (self.get_perm(addr) & PERM_MAPPED): self.set_perm(addr, (PERM_MAPPED | new_perm) & 0b1111) return addr else: return -1 for page, perm in self.pages.items(): if not (self.get_perm(page) & PERM_MAPPED): self.set_perm(page, (PERM_MAPPED | new_perm) & 0b1111) return page return -1 def check_permission(self, addr, perm): if self.get_perm(addr) & (PERM_MAPPED | perm): return True else: return False class EMU: def __init__(self): self.config = {'NX':False} self.firmware = None self.is_load = False self.register = Register() self.register.init_register() self.pipeline = [] self.memory = Memory(2 ** 20) self.checkperm = [] self.filesystem = FileSystem() self.syscall_table = [self.sys_s0, self.sys_s1, self.sys_s2, self.sys_s3, self.sys_s4, self.sys_s5] self.op_hander_table = [self.op_x0, self.op_x1, self.op_x2, self.op_x3, self.op_x4, self.op_x5, self.op_x6, self.op_x7, self.op_x8, self.op_x9, self.op_x10, self.op_x11, self.op_x12, self.op_x13, self.op_x14, self.op_x15, self.op_x16, self.op_x17, self.op_x18, self.op_x19, self.op_x20, self.op_x21, self.op_x22, self.op_x23, self.op_x24, self.op_x25, self.op_x26, self.op_x27, self.op_x28, self.op_x29, self.op_x30] def set_timeout(self, timeout = 30): def handler(signum, frame): print 'timeout!' exit(-1) signal.signal(signal.SIGALRM, handler) signal.alarm(timeout) def set_mitigation(self, nx=False): if nx: self.config['NX'] = nx def init_pipeline(self): self.pipeline.append(Stdin()) self.pipeline.append(Stdout()) def load_firmware(self, firm_name): try: with open(firm_name, 'rb') as f: data = f.read() self.firmware = [ord(byte) for byte in data] self.is_load = True if self.config['NX']: stack_perm = PERM_READ | PERM_WRITE else: stack_perm = PERM_READ | PERM_WRITE | PERM_EXEC for i in range(0, len(data) / 0x1000 + 1): self.memory.allocate(PERM_READ | PERM_WRITE | PERM_EXEC, addr=CODE_DEFAULT_BASE + i*0x1000) self.write_memory(CODE_DEFAULT_BASE, self.firmware, len(self.firmware)) for i in range(0, len(data) / 0x1000 + 1): self.memory.set_perm(CODE_DEFAULT_BASE + i*0x1000, PERM_MAPPED | PERM_READ | PERM_EXEC) self.memory.allocate(stack_perm, addr=STACK_DEFAULT_BASE) self.memory.allocate(stack_perm, addr=STACK_DEFAULT_BASE + 0x1000) self.register.set_register('pc', CODE_DEFAULT_BASE) self.register.set_register('sp', STACK_DEFAULT_BASE+0x1fe0) except: self.terminate("[VM] Firmware load error") def bit_concat(self, bit_list): res = 0 for bit in bit_list: res <<= 7 res += bit & 0b1111111 return res def execute(self): try: while 1: cur_pc = self.register.get_register('pc') op, op_type, opers, op_size = self.dispatch(cur_pc) if not self.memory.check_permission(cur_pc, PERM_EXEC) or not self.memory.check_permission(cur_pc + op_size - 1, PERM_EXEC): self.terminate("[VM] Can't exec memory") self.register.set_register('pc', cur_pc + op_size) op_handler = self.op_hander_table[op] op_handler(op_type, opers) except: self.terminate("[VM] Unknown error") def dispatch(self, addr): opcode = self.bit_concat(self.read_memory(addr, 2)) op = (opcode & 0b11111000000000) >> 9 if op >= len(self.op_hander_table): self.terminate("[VM] Invalid instruction") op_type = (opcode & 0b00000100000000) >> 8 opers = [] if op_type == TYPE_R: opers.append((opcode & 0b00000011110000) >> 4) opers.append((opcode & 0b00000000001111)) op_size = 2 elif op_type == TYPE_I: opers.append((opcode & 0b00000011110000) >> 4) opers.append(self.read_memory_tri(addr+2, 1)[0]) op_size = 5 else: self.terminate("[VM] Invalid instruction") return op, op_type, opers, op_size def read_memory(self, addr, length): if not length: return [] if self.memory.check_permission(addr, PERM_READ) and self.memory.check_permission(addr + length - 1, PERM_READ): res = self.memory[addr : addr + length] return res else: self.terminate("[VM] Can't read memory") def read_memory_str(self, addr): res = [] length = 0 while 0 not in res: res.append(self.memory[addr + length]) length += 1 res = res[:-1] length -= 1 if not length: return '', 0 if self.memory.check_permission(addr, PERM_READ) and self.memory.check_permission(addr + length - 1, PERM_READ): return ''.join(map(chr,res)), length else: self.terminate("[VM] Can't read memory") def read_memory_tri(self, addr, count): if not count: return [] if self.memory.check_permission(addr, PERM_READ) and self.memory.check_permission(addr + count*3 - 1, PERM_READ): res = [] for i in range(count): tri = 0 tri |= self.memory[addr + i*3] tri |= self.memory[addr + i*3 + 1] << 14 tri |= self.memory[addr + i*3 + 2] << 7 res.append(tri) return res else: self.terminate("[VM] Can't read memory") def write_memory(self, addr, data, length): if not length: return if self.memory.check_permission(addr, PERM_WRITE) and self.memory.check_permission(addr + length - 1, PERM_WRITE): for offset in range(length): self.memory[addr + offset] = data[offset] & 0b1111111 else: self.terminate("[VM] Can't write memory") def write_memory_tri(self,addr,data_list, count): if not count: return if self.memory.check_permission(addr, PERM_WRITE) and self.memory.check_permission(addr + count*3 - 1, PERM_WRITE): for i in range(count): self.memory[addr + i*3] = (data_list[i] & 0b000000000000001111111) self.memory[addr + i*3 + 1] = (data_list[i] & 0b111111100000000000000) >> 14 self.memory[addr + i*3 + 2] = (data_list[i] & 0b000000011111110000000) >> 7 else: self.terminate("[VM] Can't write memory") def op_x0(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] data = self.read_memory_tri(src, 1)[0] self.register.set_register(dst, data) else: self.terminate("[VM] Invalid instruction") def op_x1(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] ch = self.read_memory(src, 1)[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ch) else: self.terminate("[VM] Invalid instruction") def op_x2(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[0]) dst = self.register.get_register(opers[1]) self.write_memory_tri(dst, [src], 1) else: self.terminate("[VM] Invalid instruction") def op_x3(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[0]) dst = self.register.get_register(opers[1]) self.write_memory(dst, [src & 0b1111111], 1) else: self.terminate("[VM] Invalid instruction") def op_x4(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] self.register.set_register(dst, src) elif op_type == TYPE_I: src = opers[1] dst = opers[0] self.register.set_register(dst, src) else: self.terminate("[VM] Invalid instruction") def op_x5(self, op_type, opers): if op_type == TYPE_R: src = opers[1] dst = opers[0] org_src = self.register.get_register(src) org_dst = self.register.get_register(dst) self.register.set_register(src, org_dst) self.register.set_register(dst, org_src) else: self.terminate("[VM] Invalid instruction") def op_x6(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[0]) sp = self.register.get_register('sp') self.register.set_register('sp', sp-3) self.write_memory_tri(sp-3, [src], 1) elif op_type == TYPE_I: src = opers[1] sp = self.register.get_register('sp') self.register.set_register('sp', sp-3) self.write_memory_tri(sp-3, [src], 1) else: self.terminate("[VM] Invalid instruction") def op_x7(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] sp = self.register.get_register('sp') value = self.read_memory_tri(sp, 1)[0] self.register.set_register(dst, value) self.register.set_register('sp', sp+3) else: self.terminate("[VM] Invalid instruction") def op_x9(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst + src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst + src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x10(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) & 0b1111111 dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ((org_dst + src) & 0b1111111)) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ((org_dst + src) & 0b1111111)) else: self.terminate("[VM] Invalid instruction") def op_x11(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst - src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst - src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x12(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) & 0b1111111 dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ((org_dst - src) & 0b1111111)) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & 0b111111111111110000000) | ((org_dst - src) & 0b1111111)) else: self.terminate("[VM] Invalid instruction") def op_x13(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] value = self.register.get_register(opers[1]) org_dst = self.register.get_register(dst) self.register.set_register(dst, org_dst >> value) elif op_type == TYPE_I: dst = opers[0] value = opers[1] org_dst = self.register.get_register(dst) self.register.set_register(dst, org_dst >> value) else: self.terminate("[VM] Invalid instruction") def op_x14(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] value = self.register.get_register(opers[1]) org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst << value) & 0b111111111111111111111) elif op_type == TYPE_I: dst = opers[0] value = opers[1] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst << value) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x15(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] value = self.register.get_register(opers[1]) org_dst = self.register.get_register(dst) self.register.set_register(dst, ((org_dst * value) & 0b111111111111111111111)) elif op_type == TYPE_I: dst = opers[0] value = opers[1] org_dst = self.register.get_register(dst) self.register.set_register(dst, ((org_dst * value) & 0b111111111111111111111)) else: self.terminate("[VM] Invalid instruction") def op_x16(self, op_type, opers): if op_type == TYPE_R: dst = opers[0] value = self.register.get_register(opers[1]) if value == 0: self.terminate("[VM] Divide by zero") org_dst = self.register.get_register(dst) self.register.set_register(dst, (int(org_dst / value) & 0b111111111111111111111)) elif op_type == TYPE_I: dst = opers[0] value = opers[1] if value == 0: self.terminate("[VM] Divide by zero") org_dst = self.register.get_register(dst) self.register.set_register(dst, (int(org_dst / value) & 0b111111111111111111111)) else: self.terminate("[VM] Invalid instruction") def op_x17(self, op_type, opers): if op_type == TYPE_R: src = opers[0] value = self.register.get_register(src) value += 1 self.register.set_register(src, value) else: self.terminate("[VM] Invalid instruction") def op_x18(self, op_type, opers): if op_type == TYPE_R: src = opers[0] value = self.register.get_register(src) value -= 1 self.register.set_register(src, value) else: self.terminate("[VM] Invalid instruction") def op_x19(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst & src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x20(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst | src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst | src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x21(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst ^ src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst ^ src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x22(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst % src) & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = opers[0] org_dst = self.register.get_register(dst) self.register.set_register(dst, (org_dst % src) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x23(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) dst = self.register.get_register(opers[0]) tmp = dst - src if tmp == 0: eflags = FLAG_ZF elif tmp < 0: eflags = FLAG_NF else: eflags = 0b0000 self.register.set_register('eflags', eflags & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] dst = self.register.get_register(opers[0]) tmp = dst - src if tmp == 0: eflags = FLAG_ZF elif tmp < 0: eflags = FLAG_NF else: eflags = 0b0000 self.register.set_register('eflags', eflags & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x24(self, op_type, opers): if op_type == TYPE_R: src = self.register.get_register(opers[1]) & 0b000000000000001111111 dst = self.register.get_register(opers[0]) & 0b000000000000001111111 tmp = dst - src if tmp == 0: eflags = FLAG_ZF elif tmp < 0: eflags = FLAG_NF else: eflags = 0b0000 self.register.set_register('eflags', eflags & 0b111111111111111111111) elif op_type == TYPE_I: src = opers[1] & 0b000000000000001111111 dst = self.register.get_register(opers[0]) & 0b000000000000001111111 tmp = dst - src if tmp == 0: eflags = FLAG_ZF elif tmp < 0: eflags = FLAG_NF else: eflags = 0b0000 self.register.set_register('eflags', eflags & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x25(self, op_type, opers): if op_type == TYPE_R: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) if not (eflags & FLAG_NF) and not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = opers[1] if not (eflags & FLAG_NF) and not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x26(self, op_type, opers): if op_type == TYPE_R: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) if (eflags & FLAG_NF) and not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = opers[1] if (eflags & FLAG_NF) and not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x27(self, op_type, opers): if op_type == TYPE_R: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) if (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = opers[1] if (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x28(self, op_type, opers): if op_type == TYPE_R: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) if not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: eflags = self.register.get_register('eflags') base = self.register.get_register(opers[0]) offset = opers[1] if not (eflags & FLAG_ZF): self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x29(self, op_type, opers): if op_type == TYPE_R: base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: base = self.register.get_register(opers[0]) offset = opers[1] self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x30(self, op_type, opers): if op_type == TYPE_R: base = self.register.get_register(opers[0]) offset = self.register.get_register(opers[1]) ret_addr = self.register.get_register('pc') self.op_x6(1, [0, ret_addr]) self.register.set_register('pc', (base + offset) & 0b111111111111111111111) elif op_type == TYPE_I: base = self.register.get_register(opers[0]) offset = opers[1] ret_addr = self.register.get_register('pc') self.op_x6(1, [0, ret_addr]) self.register.set_register('pc', (base + offset) & 0b111111111111111111111) else: self.terminate("[VM] Invalid instruction") def op_x8(self, op_type, opers): syscall_num = self.register.get_register('r0') if 0 <= syscall_num < len(self.syscall_table): syscall = self.syscall_table[syscall_num] syscall() else: self.terminate("[VM] Invalid syscall") def sys_s0(self): exit(0) def sys_s1(self): filename, filename_len = self.read_memory_str(self.register.get_register('r1')) fd = self.filesystem.open(filename) if fd != -1: self.pipeline.append(fd) self.register.set_register('r0', len(self.pipeline) - 1) else: self.register.set_register('r0', 0b111111111111111111111) def sys_s2(self): fd = self.register.get_register('r1') buf = self.register.get_register('r2') size = self.register.get_register('r3') data = self.read_memory(buf, size) if 0 <= fd < len(self.pipeline): self.pipeline[fd].write(data) self.register.set_register('r0', size) else: self.register.set_register('r0', 0) def sys_s3(self): fd = self.register.get_register('r1') buf = self.register.get_register('r2') size = self.register.get_register('r3') if 0 <= fd < len(self.pipeline): data = map(ord, self.pipeline[fd].read(size)) self.write_memory(buf, data, len(data)) self.register.set_register('r0', len(data) & 0b111111111111111111111) else: self.register.set_register('r0', 0) def sys_s4(self): res_ptr = self.register.get_register('r1') perm = self.register.get_register('r2') addr = self.memory.allocate(perm) if addr != -1: self.write_memory_tri(res_ptr, [addr], 1) self.register.set_register('r0', 1) else: self.register.set_register('r0', 0) def sys_s5(self): self.register.set_register('r0', random.randrange(0, 2**21-1)) def terminate(self, msg): print msg exit(-1)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/pwn/CST/wrapper.py
ctfs/Codegate/2023/Quals/pwn/CST/wrapper.py
import subprocess import tempfile import base64 import os code = input('Enter Your base64 > ') try: code = base64.b64decode(code) except: print('base64 error') exit(1) if b'#' in code: print('error') exit(1) _, filename = tempfile.mkstemp(prefix='ctf-') f = open(filename, 'wb') f.write(code) f.close() p = subprocess.Popen(['./cst', filename], stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE) p.wait(timeout=3) print('======= stdout =======') print(p.stdout.read().decode()) print('======= stderr =======') print(p.stderr.read().decode()) # os.unlink(filename)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/pwn/pcpu/precheck.py
ctfs/Codegate/2023/Quals/pwn/pcpu/precheck.py
from pwn import * import sys import os f = open(sys.argv[1], 'rb') size = int(f.readline()) ops = [] for i in range(size): ops.append(p32(int(f.readline()) & 0xffffffff)) f.close() regs = { '0': {'size': 0, 'data': 0}, '1': {'size': 0, 'data': 0}, '2': {'size': 0, 'data': 0}, '3': {'size': 0, 'data': 0}, } for op in ops: inst = op[0] print(inst) if inst == 0: idx = op[1] data = u16(op[2:]) assert 0 <= idx <= 3 regs[str(idx)]['data'] = data elif inst == 1: dest = op[1] pad = op[2] src = op[3] assert 0 <= src <= 3 assert pad == 0 assert 0 <= dest <= 3 regs[str(dest)]['data'] = regs[str(src)]['data'] elif inst == 2: idx = op[1] size = u16(op[2:]) assert 0 <= idx <= 3 regs[str(idx)]['size'] = size regs[str(idx)]['data'] = [0 for i in range(size)] elif inst == 3: reg = op[1] idx = op[2] data = op[3] assert 0 <= reg <= 3 assert isinstance(regs[str(reg)]['data'], list) assert idx < regs[str(reg)]['size'] regs[str(reg)]['data'][idx] = data elif inst == 4: dest = op[1] reg = op[2] idx = op[3] assert 0 <= dest <= 3 assert 0 <= reg <= 3 assert isinstance(regs[str(reg)]['data'], list) assert idx < regs[str(reg)]['size'] regs[str(dest)]['data'] = regs[str(reg)]['data'][idx] elif inst == 5: reg = op[1] pad = op[2] data = op[3] assert 0 <= reg <= 3 assert pad == 0 assert isinstance(regs[str(reg)]['data'], list) assert isinstance(regs['0']['data'], int) assert regs['0']['data'] < regs[str(reg)]['size'] regs[str(reg)]['data'][regs['0']['data']] = data elif inst == 6: dest = op[1] pad = op[2] reg = op[3] assert 0 <= dest <= 3 assert 0 <= reg <= 3 assert pad == 0 assert isinstance(regs[str(reg)]['data'], list) assert isinstance(regs['0']['data'], int) assert regs['0']['data'] < regs[str(reg)]['size'] regs[str(dest)]['data'] = regs[str(reg)]['data'][regs['0']['data']] elif inst == 7: pass else: assert 0 <= inst <= 7
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/crypto/secure_primeGenerator/client_example.py
ctfs/Codegate/2023/Quals/crypto/secure_primeGenerator/client_example.py
from Crypto.Util.number import * from hashlib import sha256 from pwn import * from itertools import product import random def get_additive_shares(x, n, mod): shares = [0] * n shares[n-1] = x for i in range(n-1): shares[i] = random.randrange(mod) shares[n-1] = (shares[n-1] - shares[i]) % mod assert sum(shares) % mod == x return shares BITS = 512 def POW(): print("[DEBUG] POW...") b_postfix = r.recvline().decode().split(' = ')[1][6:].strip() h = r.recvline().decode().split(' = ')[1].strip() for brute in product('0123456789abcdef', repeat=6): b_prefix = ''.join(brute) b_ = b_prefix + b_postfix if sha256(bytes.fromhex(b_)).hexdigest() == h: r.sendlineafter(b' > ', b_prefix.encode()) return True assert 0, "Something went wrong.." def generate_shared_modulus(): print("[DEBUG] generate_shared_modulus...") p2 = random.randrange(2 ** BITS, 2 ** (BITS+1)) q2 = random.randrange(2 ** BITS, 2 ** (BITS+1)) SMALL_PRIMES = [2, 3, 5, 7, 11, 13] # Candidates of p1 for prime in SMALL_PRIMES: remainder_candidates = [] # c = (-p2 % prime) should not be chosen while len(remainder_candidates) < (prime+1) // 2: c = random.randrange(prime) if c == -p2 % prime or c in remainder_candidates: continue remainder_candidates.append(c) r.sendlineafter(b' > ', ' '.join(str(c) for c in remainder_candidates).encode()) # Candidates of q1 for prime in SMALL_PRIMES: remainder_candidates = [] # c = (-q2 % prime) should not be chosen while len(remainder_candidates) < (prime+1) // 2: c = random.randrange(prime) if c == -q2 % prime or c in remainder_candidates: continue remainder_candidates.append(c) r.sendlineafter(b' > ', ' '.join(str(c) for c in remainder_candidates).encode()) p1_enc = int(r.recvline().decode().split(' = ')[1]) q1_enc = int(r.recvline().decode().split(' = ')[1]) p2_enc = pow(p2, SERVER_E, SERVER_N) q2_enc = pow(q2, SERVER_E, SERVER_N) X = [] shares_a = get_additive_shares(1, 4, SERVER_N) shares_b = get_additive_shares(1, 4, SERVER_N) shares_c = get_additive_shares(1, 4, SERVER_N) # N = p1*q1 + sum(pow(x, SERVER_D, SERVER_N) for x in X) = p1*q1 + p1*q2 + p2*q1 * p2*q2 = (p1+p2)*(q1+q2) for i in range(4): X.append(pow(shares_a[i], SERVER_E, SERVER_N) * p1_enc * q2_enc % SERVER_N) X.append(pow(shares_b[i], SERVER_E, SERVER_N) * p2_enc * q1_enc % SERVER_N) X.append(pow(shares_c[i], SERVER_E, SERVER_N) * p2_enc * q2_enc % SERVER_N) random.shuffle(X) r.sendlineafter(b' > ', ' '.join(str(x) for x in X).encode()) N = int(r.recvline().decode().split(' = ')[1]) return p2, q2, N # STEP 2 - N_validity_check def N_validity_check_client(p2, q2, N): print("[DEBUG] N_validity_check_client...") for _ in range(20): b = int(r.recvline().decode().split(' = ')[1]) client_digest = sha256(long_to_bytes(pow(b, p2+q2, N))).hexdigest() r.sendlineafter(b' > ', client_digest.encode()) msg = r.recvline().decode() if msg != "good!\n": print(msg) return -1 flag_enc = int(r.recvline().decode().split(' = ')[1]) return flag_enc r = process(["python3", "./prob.py"]) POW() SERVER_N = int(r.recvline().decode().split(' = ')[1]) SERVER_E = int(r.recvline().decode().split(' = ')[1]) p2, q2, N = generate_shared_modulus() flag_enc = N_validity_check_client(p2, q2, N) if flag_enc == -1: exit(-1) print(f"{N = }") print(f"{flag_enc = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/crypto/secure_primeGenerator/prob.py
ctfs/Codegate/2023/Quals/crypto/secure_primeGenerator/prob.py
from Crypto.Util.number import * from hashlib import sha256 import os import signal BITS = 512 def POW(): b = os.urandom(32) print(f"b = ??????{b.hex()[6:]}") print(f"SHA256(b) = {sha256(b).hexdigest()}") prefix = input("prefix > ") b_ = bytes.fromhex(prefix + b.hex()[6:]) return sha256(b_).digest() == sha256(b).digest() def generate_server_key(): while True: p = getPrime(1024) q = getPrime(1024) e = 0x10001 if (p-1) % e == 0 or (q-1) % e == 0: continue d = pow(e, -1, (p-1)*(q-1)) n = p*q return e, d, n # Generate N = (p1+p2) * (q1+q2) where p2 and q2 are shares chosen by the client def generate_shared_modulus(): SMALL_PRIMES = [2, 3, 5, 7, 11, 13] print(f"{SERVER_N = }") print(f"{SERVER_E = }") p1_remainder_candidates = {} q1_remainder_candidates = {} # We prevent p1+p2 is divided by small primes # by asking the client for a possible remainders of p1 for prime in SMALL_PRIMES: remainder_candidates = set(map(int, input(f"Candidates of p1 % {prime} > ").split())) assert len(remainder_candidates) == (prime+1) // 2, f"[-] wrong candidates for {prime}" p1_remainder_candidates[prime] = remainder_candidates while True: p1 = bytes_to_long(os.urandom(BITS // 8)) for prime in SMALL_PRIMES: if p1 % prime not in p1_remainder_candidates[prime]: break else: break # and same goes for q1 for prime in SMALL_PRIMES: remainder_candidates = set(map(int, input(f"Candidates of q1 % {prime} > ").split())) assert len(remainder_candidates) == (prime+1) // 2, f"[-] wrong candidates for {prime}" q1_remainder_candidates[prime] = remainder_candidates while True: q1 = bytes_to_long(os.urandom(BITS // 8)) for prime in SMALL_PRIMES: if q1 % prime not in q1_remainder_candidates[prime]: break else: break p1_enc = pow(p1, SERVER_E, SERVER_N) q1_enc = pow(q1, SERVER_E, SERVER_N) print(f"{p1_enc = }") print(f"{q1_enc = }") X = list(map(int, input("X > ").split())) assert len(X) == 12 N = (p1*q1 + sum(pow(x, SERVER_D, SERVER_N) for x in X)) % SERVER_N assert N.bit_length() >= 1024, f"[-] too short.., {N.bit_length()}" print(f"{N = }") return p1, q1, N # check whether N is a product of two primes def N_validity_check(p1, q1, N): for _ in range(20): b = bytes_to_long(os.urandom(2 * BITS // 8)) print(f"{b = }") client_digest = input("Client digest > ") server_digest = sha256(long_to_bytes(pow(b, N+1-p1-q1, N))).hexdigest() if server_digest != client_digest: print("N is not a product of two primes I guess..") return False else: print("good!") return True if not POW(): exit(-1) signal.alarm(60) SERVER_E, SERVER_D, SERVER_N = generate_server_key() p1, q1, N = generate_shared_modulus() if not N_validity_check(p1, q1, N): exit(-1) FLAG = open("flag", 'rb').read() FLAG += b'\x00' + os.urandom(128 - 2 - len(FLAG)) FLAG_ENC = pow(bytes_to_long(FLAG), 0x10001, N) print(f"{FLAG_ENC = }")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/crypto/My_File_Encryptor/remote.py
ctfs/Codegate/2023/Quals/crypto/My_File_Encryptor/remote.py
#!/usr/bin/env python3 from file_crypto import FileCipher, random_index, index_from_bytes from file_crypto import LOCAL_NONCE import base64 if __name__ == "__main__": # Read data mode = input("mode? ").strip() nonce = base64.b64decode(input("nonce? ").strip()) index_bytes = base64.b64decode(input("index? ").strip()) data = base64.b64decode(input("data? ").strip()) if len(data) > 0x4000: print("Sorry, the length of the given data is too long :(") exit(1) if nonce == LOCAL_NONCE: print("Sorry, this nonce is only allowed in the local mode :(") exit(1) # Do crypto cipher = FileCipher() index = index_from_bytes(index_bytes) if mode == "enc": result = cipher.encrypt(nonce, index, data) elif mode == "dec": result = cipher.decrypt(nonce, index, data) else: print("Wrong mode! :(") exit(1) print(base64.b64encode(result).decode())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/crypto/My_File_Encryptor/local.py
ctfs/Codegate/2023/Quals/crypto/My_File_Encryptor/local.py
#!/usr/bin/env python3 from file_crypto import FileCipher, random_index, index_to_bytes, index_from_bytes from file_crypto import LOCAL_NONCE, BLOCK_SIZE, INDEX_SIZE import sys if __name__ == "__main__": assert len(sys.argv) == 3 cipher = FileCipher() with open(sys.argv[2], "rb") as f: data = f.read() if sys.argv[1] == "enc": index = random_index() ciphertext = cipher.encrypt(LOCAL_NONCE, index, data) index_bytes = index_to_bytes(index) with open(sys.argv[2] + ".enc", "wb") as f: f.write(LOCAL_NONCE) f.write(index_bytes) f.write(ciphertext) elif sys.argv[1] == "dec": nonce = data[:BLOCK_SIZE] index_bytes = data[BLOCK_SIZE : BLOCK_SIZE + INDEX_SIZE] ciphertext = data[BLOCK_SIZE + INDEX_SIZE :] index = index_from_bytes(index_bytes) plaintext = cipher.decrypt(nonce, index, ciphertext) with open(sys.argv[2] + ".dec", "wb") as f: f.write(plaintext)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/crypto/My_File_Encryptor/file_crypto.py
ctfs/Codegate/2023/Quals/crypto/My_File_Encryptor/file_crypto.py
#!/usr/bin/env python3 from __future__ import annotations from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad import random import struct BLOCK_SIZE = 16 INDEX_SIZE = 20 KEY_SIZE = 16 LOCAL_NONCE = bytes(range(BLOCK_SIZE)) def random_index() -> list[int]: return [random.randint(0, 64) for _ in range(INDEX_SIZE)] def index_to_bytes(index: list[int]) -> bytes: assert len(index) == INDEX_SIZE return struct.pack(f"<{INDEX_SIZE}b", *index) def index_from_bytes(index_bytes: bytes) -> list[int]: assert len(index_bytes) == INDEX_SIZE return list(struct.unpack(f"<{INDEX_SIZE}b", index_bytes)) class GF: MOD = 0x19F2BBF3EF3A2AB6684710EB139F3A9AD def __init__(self, v: int): assert 0 <= v < 2**128 self.v = v @classmethod def _double(cls, v): if v >> 127: new_v = (v << 1) ^ cls.MOD else: new_v = v << 1 return new_v def __add__(self, other): return GF(self.v ^ other.v) def __iadd__(self, other): self.v ^= other.v return self def __mul__(self, other): res, cur = 0, self.v for i in range(128): if (other.v >> i) & 1: res ^= cur cur = self._double(cur) return GF(res) def __imul__(self, other): res = self * other self.v = res.v return self def __pow__(self, y): y %= 2**128 - 1 res, cur = GF(1), GF(self.v) while y: if y & 1: res *= cur cur *= cur y >>= 1 return res @classmethod def from_bytes(cls, b: bytes): assert len(b) <= BLOCK_SIZE return cls(int.from_bytes(b, "little")) def to_bytes(self) -> bytes: return self.v.to_bytes(BLOCK_SIZE, "little") class FileCipher: def __init__(self): with open("key", "rb") as f: key = f.read(KEY_SIZE) assert len(key) == KEY_SIZE self.cipher = AES.new(key, AES.MODE_ECB) with open("vectors", "rb") as f: self.vectors = [] for _ in range(INDEX_SIZE): vec = f.read(BLOCK_SIZE) assert len(vec) == BLOCK_SIZE self.vectors.append(GF.from_bytes(vec)) def encrypt(self, nonce: bytes, index: list[int], plaintext: bytes) -> bytes: data = pad(plaintext, BLOCK_SIZE) assert len(data) % BLOCK_SIZE == 0 assert len(nonce) == BLOCK_SIZE assert len(index) == INDEX_SIZE return self._do_crypto(nonce, index, data, is_decrypt=False) def decrypt(self, nonce: bytes, index: list[int], ciphertext: bytes) -> bytes: assert len(ciphertext) % BLOCK_SIZE == 0 assert len(nonce) == BLOCK_SIZE assert len(index) == INDEX_SIZE return self._do_crypto(nonce, index, ciphertext, is_decrypt=True) def _initialize_alpha(self, nonce: bytes, index: list[int]) -> GF: encrypted_nonce = self.cipher.encrypt(nonce) alpha = GF.from_bytes(encrypted_nonce) for vector, exponent in zip(self.vectors, index): alpha *= vector**exponent return alpha def _update_alpha(self, index: list[int], alpha: GF, block_num: int) -> GF: block_num %= INDEX_SIZE index[block_num] += 1 return alpha * self.vectors[block_num] def _gf_encrypt(self, v: GF) -> GF: enc = self.cipher.encrypt(v.to_bytes()) return GF.from_bytes(enc) def _gf_decrypt(self, v: GF) -> GF: dec = self.cipher.decrypt(v.to_bytes()) return GF.from_bytes(dec) def _do_crypto( self, nonce: bytes, index: list[int], data: bytes, is_decrypt: bool = False ) -> bytes: index = index[:] # Copy index # 1. Initialize alpha alpha = self._initialize_alpha(nonce, index) result = b"" for offset in range(0, len(data), BLOCK_SIZE): if index == [0] * INDEX_SIZE: print("Index cannot be NULL") return b"" block = data[offset : offset + BLOCK_SIZE] b = GF.from_bytes(block) # 2. Do enc/dec b += alpha if is_decrypt: b = self._gf_decrypt(b) else: b = self._gf_encrypt(b) b += alpha result += b.to_bytes() # 3. Update alpha alpha = self._update_alpha(index, alpha, offset // BLOCK_SIZE) return result
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/crypto/anti_Kerckhoffs/prob.py
ctfs/Codegate/2023/Quals/crypto/anti_Kerckhoffs/prob.py
import math import os import hashlib import signal import secrets QUERY_LIMIT = 77777 MOD = 17 m = 20 def quadratic_eval(coeffs, x): return (coeffs[2] * x ** 2 + coeffs[1] * x + coeffs[0]) % MOD def get_random_quadratic(): c2 = secrets.randbelow(MOD - 1) + 1 c1 = secrets.randbelow(MOD) c0 = secrets.randbelow(MOD) return [c0, c1, c2] def calc(Inputs): Outputs = [quadratic_eval(SboxLayer1[i], Inputs[i]) for i in range(m)] Outputs = [sum(LinearLayer[i][j] * Outputs[j] for j in range(m)) for i in range(m)] Outputs = [quadratic_eval(SboxLayer2[i], Outputs[i]) for i in range(m)] return Outputs def print_list(L, prefix = ''): print(prefix, end='') for x in L: print(x, end = ' ') print() def compare(L1, L2): ret = 0 for i in range(m): if L1[i] == L2[i]: ret += 2 ** i return ret def list_to_int(L): assert len(L) == m, "Invalid list format" assert all(0 <= x < MOD for x in L), "Invalid list format" ret = 0 for i in range(m): ret += L[i] * MOD ** i return ret def int_to_list(x): assert 0 <= x < MOD ** m, "Invalid int format" L = [0] * m for i in range(m): L[i] = x % MOD x //= MOD return L SboxLayer1 = [get_random_quadratic() for _ in range(m)] LinearLayer = [[secrets.randbelow(MOD-1) + 1 for _ in range(m)] for _ in range(m)] SboxLayer2 = [get_random_quadratic() for _ in range(m)] HIDDEN = [secrets.randbelow(MOD) for _ in range(m)] TARGET = calc(HIDDEN) print(f"TARGET = {list_to_int(TARGET)}") query_count = 0 win = False while not win: Inputs = list(map(int, input("Inputs > ").split())) query_count += len(Inputs) if query_count > QUERY_LIMIT: print("bye..") exit(-1) Outputs = [] for I in Inputs: O = calc(int_to_list(I)) if TARGET == O: win = True Outputs.append(compare(TARGET, O)) print_list(Outputs, "Outputs = ") print("Good job!", open("flag", 'r').read())
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/web/CODEGATE_Music_Player/worker/app/worker.py
ctfs/Codegate/2023/Quals/web/CODEGATE_Music_Player/worker/app/worker.py
#!/usr/bin/python3 -u #-*- coding: utf-8 -*- # Developer: stypr (https://harold.kim/) # Target is at http://nginx/ import os import asyncio import time import redis import requests from pyppeteer import launch redis = redis.Redis('redis') redis.select(1) browser = None browser_option = { 'executablePath': '/usr/bin/google-chrome-stable', 'options': {'args': [ '--no-sandbox', '--disable-default-apps', '--disable-extensions', '--disable-gpu', '--disable-sync', '--disable-translate', '--hide-scrollbars', '--metrics-recording-only', "--js-flags='--jitless'", '--mute-audio', '--no-first-run', '--safebrowsing-disable-auto-update', '--disable-dev-shm-usage', '--user-agent=Mozilla/5.0 (iPhone; CPU iPhone OS 12_2 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/15E148', ]}, 'handleSIGINT': False, 'handleSIGTERM': False, 'handleSIGHUP': False, 'headless': True } async def init_browser(): global browser _browser = await launch(**browser_option) page = await _browser.newPage() try: await page.goto("http://nginx/") cookie = { "name": "SECRET", "value": os.environ['SECRET'], "domain": "nginx", "path": "/", "httpOnly": True, "secure": False } await page.setCookie(cookie) except Exception as e: print("[!] Error during browser initialization: " + str(e)) finally: await page.close() print("[.] Browser is now loaded.") return _browser async def render(url): timeout = 3 try: print("[.] Begin crawling...") page = await browser.newPage() await page.goto(url, { 'timeout': timeout * 1000, 'waitUntil' : 'networkidle0' }) await page.close() print("[.] Rendering complete..") except Exception as e: print(f"[!!] {e}") finally: await page.close() async def main(loop): global browser while True: try: print("[+] Handler has begun..") data = redis.blpop("query")[1].decode() if data: print(f"[*] Got a new request: {data}") if not browser: browser = await init_browser() _task = await asyncio.wait_for(render(data), timeout=5) except Exception as e: print(f"[!] {e}") finally: await asyncio.sleep(0.01) if __name__ == "__main__": loop = asyncio.get_event_loop() loop.run_until_complete(main(loop))
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/web/Calculator/verify_pow.py
ctfs/Codegate/2023/Quals/web/Calculator/verify_pow.py
#!/usr/bin/env python3 import secrets import hashlib from time import time import sys class NcPowser: def __init__(self, difficulty=22, prefix_length=16): self.difficulty = difficulty self.prefix_length = prefix_length def get_challenge(self): return secrets.token_urlsafe(self.prefix_length)[:self.prefix_length].replace('-', 'b').replace('_', 'a') def verify_hash(self, prefix, answer): h = hashlib.sha256() h.update((prefix + answer).encode()) bits = ''.join(bin(i)[2:].zfill(8) for i in h.digest()) return bits.startswith('0' * self.difficulty) if __name__ == '__main__': powser = NcPowser() if powser.verify_hash(sys.argv[1],sys.argv[2]): print("success") else: print("fail")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2023/Quals/web/Calculator/gen_pow.py
ctfs/Codegate/2023/Quals/web/Calculator/gen_pow.py
#!/usr/bin/env python3 import secrets import hashlib from time import time class NcPowser: def __init__(self, difficulty=28, prefix_length=22): self.difficulty = difficulty self.prefix_length = prefix_length def get_challenge(self): return secrets.token_urlsafe(self.prefix_length)[:self.prefix_length].replace('-', 'b').replace('_', 'a') def verify_hash(self, prefix, answer): h = hashlib.sha256() h.update((prefix + answer).encode()) bits = ''.join(bin(i)[2:].zfill(8) for i in h.digest()) return bits.startswith('0' * self.difficulty) if __name__ == '__main__': powser = NcPowser() prefix = powser.get_challenge() print(prefix)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/Happy_S-box/chal.py
ctfs/Codegate/2022/Quals/crypto/Happy_S-box/chal.py
#!/usr/bin/python3 import os import random class LFSR: rand = random.Random("Codegate2022") Sbox = [ [0] * 64 + [1] * 64 for _ in range(512 - 6) ] for i in range(len(Sbox)): rand.shuffle(Sbox[i]) def __init__(self, seed): self.state = seed for _ in range(1024): self.next() def next(self): v = self.state # x^512 + x^8 + x^5 + x^2 + 1 n = ((v >> 0) ^ (v >> 504) ^ (v >> 507) ^ (v >> 509)) & 1 self.state = (v >> 1) | (n << 511) def output(self): out = 0 for i in range(512 - 6): out ^= self.Sbox[i][(self.state >> i) & 127] return out guess_this = os.urandom((512 - 8) // 8) guess_this = guess_this[:-1] + bytes([guess_this[-1] & 0xf0]) seed = int.from_bytes(guess_this, 'big') << 8 print("Seed generated. It'll take some time to generate a hint.") v = 0 for i in range(2 ** 12): lfsr = LFSR(seed | i) v <<= 1 v |= lfsr.output() print("Here's the hint. It should be enough.") print(v.to_bytes(2 ** 12 // 8, 'big').hex()) ans = input("Guess the seed > ") if guess_this == bytes.fromhex(ans): with open('flag', 'r') as f: print(f.read()) else: print("WRONG")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/DarkArts/chal.py
ctfs/Codegate/2022/Quals/crypto/DarkArts/chal.py
import os import hashlib import signal signal.alarm(300) def inner_product(u, v): assert len(u) == len(v) res = 0 for a, b in zip(u, v): res += a * b return res def guess_mode(G): while True: idx = int(input()) if idx == 0: x = int(input()) print(G.calc(x)) elif idx == 1: mode = int(input()) if mode != G.mode: exit() else: break else: exit() def guess_key(G, l): while True: idx = int(input()) if idx == 0: x = int(input()) print(G.func_gen(x)) elif idx == 1: for i in range(l): x = int(input()) if x != G.key[i]: exit() break else: exit() class Generator1: def __init__(self): seed = int.from_bytes(os.urandom(32), "big") self.key = [0] * 256 for i in range(256): self.key[i] = (seed >> i) & 1 self.mode = os.urandom(1)[0] & 1 self.p = 2 self.q = 3 self.cache0 = {} self.cache1 = {} def func_gen(self, x): assert 0 <= x < (1 << 256) if x in self.cache0.keys(): return self.cache0[x] arr = [0] * 256 for i in range(256): arr[i] = (x >> i) & 1 prod = inner_product(self.key, arr) self.cache0[x] = (prod % self.p + prod % self.q) % self.p return self.cache0[x] def func_random(self, x): assert 0 <= x < (1 << 256) if x in self.cache1.keys(): return self.cache1[x] self.cache1[x] = os.urandom(1)[0] & 1 return self.cache1[x] def calc(self, x): ret0 = self.func_gen(x) ret1 = self.func_random(x) if self.mode == 0: return ret0 else: return ret1 def challenge_generator_1(): print("Challenge 1") for _ in range(64): G = Generator1() guess_mode(G) class Generator2: def __init__(self): seed = int.from_bytes(os.urandom(32), "big") self.key = [0] * 256 for i in range(256): self.key[i] = (seed >> i) & 1 self.mode = os.urandom(1)[0] & 1 self.p = 5 self.q = 7 self.cache0 = {} self.cache1 = {} def func_gen(self, x): x = int.from_bytes(hashlib.sha256(str(x).encode()).digest(), "big") if x in self.cache0.keys(): return self.cache0[x] hashed = [0] * 256 for i in range(256): hashed[i] = (x >> i) & 1 prod = inner_product(self.key, hashed) self.cache0[x] = (prod % self.p + prod % self.q) % self.p return self.cache0[x] def func_random(self, x): x = int.from_bytes(hashlib.sha256(str(x).encode()).digest(), "big") if x in self.cache1.keys(): return self.cache1[x] self.cache1[x] = int.from_bytes(os.urandom(32), "big") % self.p return self.cache1[x] def calc(self, x): ret0 = self.func_gen(x) ret1 = self.func_random(x) if self.mode == 0: return ret0 else: return ret1 def challenge_generator_2(): print("Challenge 2") for _ in range(64): G = Generator2() guess_mode(G) class Generator3: def __init__(self): seed = int.from_bytes(os.urandom(16), "big") self.key = [0] * 64 for i in range(64): self.key[i] = seed & 3 seed = seed >> 2 self.p = 2 self.q = 5 def func_gen(self, x): x = int.from_bytes(hashlib.sha256(str(x).encode()).digest(), "big") hashed = [0] * 64 for i in range(64): hashed[i] = x % self.q x = x // self.q prod = inner_product(self.key, hashed) return (prod % self.q) % self.p def challenge_generator_3(): print("Challenge 3") G = Generator3() guess_key(G, 64) class Generator4: def __init__(self): self.key = [0] * 16 for i in range(16): self.key[i] = int.from_bytes(os.urandom(32), "big") self.p = int.from_bytes(os.urandom(32), "big") + (1 << 256) self.q = int.from_bytes(os.urandom(16), "big") + (1 << 128) print(self.p) print(self.q) def func_gen(self, x): x = hashlib.sha256(str(x).encode()).digest() hashed = [] for _ in range(16): hashed.append(int.from_bytes(x, "big")) x = hashlib.sha256(x).digest() prod = inner_product(self.key, hashed) return (prod % self.p + prod % self.q) % self.p def challenge_generator_4(): print("Challenge 4") G = Generator4() guess_key(G, 16) challenge_generator_1() challenge_generator_2() challenge_generator_3() challenge_generator_4() flag = open("flag", "r").read() print(flag)
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/PrimeGenerator/prime_generator.py
ctfs/Codegate/2022/Quals/crypto/PrimeGenerator/prime_generator.py
#!/usr/bin/python3 from Crypto.Util.number import * import os BITS = 512 UPPER_BITS = 296 LOWER_BITS = BITS - UPPER_BITS UPPER = bytes_to_long(os.urandom(UPPER_BITS // 8)) << LOWER_BITS FLAG = b'codegate2022{this_is_a_sample_flag}' def menu1(): while True: lower = bytes_to_long(os.urandom(LOWER_BITS // 8)) p = UPPER | lower if isPrime(p): return lower def menu2(): p = UPPER + menu1() q = getPrime(512) e = 0x10001 n = p * q return n, pow(bytes_to_long(FLAG + b'\x00' + os.urandom(128 - 2 - len(FLAG))), e, n) while True: print("1. Generate 10 random primes (only lower bits)") print("2. Encrypt a flag") idx = int(input("> ")) if idx == 1: print("How many? (Up to 10)") num = int(input("> ")) for _ in range(min(10, num)): print(menu1()) elif idx == 2: n, c = menu2() print(f"n : {n}") print(f"c : {c}") UPPER = bytes_to_long(os.urandom(UPPER_BITS // 8)) << LOWER_BITS
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/manage.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/manage.py
#!/usr/bin/env python """Django's command-line utility for administrative tasks.""" import os import sys def main(): """Run administrative tasks.""" os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'nft_web.settings') try: from django.core.management import execute_from_command_line except ImportError as exc: raise ImportError( "Couldn't import Django. Are you sure it's installed and " "available on your PYTHONPATH environment variable? Did you " "forget to activate a virtual environment?" ) from exc execute_from_command_line(sys.argv) if __name__ == '__main__': main()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/asgi.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/asgi.py
""" ASGI config for nft_web project. It exposes the ASGI callable as a module-level variable named ``application``. For more information on this file, see https://docs.djangoproject.com/en/3.2/howto/deployment/asgi/ """ import os from django.core.asgi import get_asgi_application os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'nft_web.settings') application = get_asgi_application()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/settings.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/settings.py
""" Django settings for nft_web project. Generated by 'django-admin startproject' using Django 3.2.1. For more information on this file, see https://docs.djangoproject.com/en/3.2/topics/settings/ For the full list of settings and their values, see https://docs.djangoproject.com/en/3.2/ref/settings/ """ from pathlib import Path # Build paths inside the project like this: BASE_DIR / 'subdir'. BASE_DIR = Path(__file__).resolve().parent.parent # Quick-start development settings - unsuitable for production # See https://docs.djangoproject.com/en/3.2/howto/deployment/checklist/ # SECURITY WARNING: keep the secret key used in production secret! SECRET_KEY = '****SENSORED****' # SECURITY WARNING: don't run with debug turned on in production! DEBUG = False ALLOWED_HOSTS = ['*'] # Application definition INSTALLED_APPS = [ 'account.apps.AccountConfig', 'django.contrib.admin', 'django.contrib.auth', 'django.contrib.contenttypes', 'django.contrib.sessions', 'django.contrib.messages', 'django.contrib.staticfiles', ] MIDDLEWARE = [ 'django.middleware.security.SecurityMiddleware', 'django.contrib.sessions.middleware.SessionMiddleware', 'django.middleware.common.CommonMiddleware', 'django.middleware.csrf.CsrfViewMiddleware', 'django.contrib.auth.middleware.AuthenticationMiddleware', 'django.contrib.messages.middleware.MessageMiddleware', 'django.middleware.clickjacking.XFrameOptionsMiddleware', ] ROOT_URLCONF = 'nft_web.urls' TEMPLATES = [ { 'BACKEND': 'django.template.backends.django.DjangoTemplates', 'DIRS': [], 'APP_DIRS': True, 'OPTIONS': { 'context_processors': [ 'django.template.context_processors.debug', 'django.template.context_processors.request', 'django.contrib.auth.context_processors.auth', 'django.contrib.messages.context_processors.messages', ], }, }, ] WSGI_APPLICATION = 'nft_web.wsgi.application' # Database # https://docs.djangoproject.com/en/3.2/ref/settings/#databases DATABASES = { 'default': { 'ENGINE': 'django.db.backends.sqlite3', 'NAME': BASE_DIR / 'db.sqlite3', } } # Password validation # https://docs.djangoproject.com/en/3.2/ref/settings/#auth-password-validators AUTH_PASSWORD_VALIDATORS = [ { 'NAME': 'django.contrib.auth.password_validation.UserAttributeSimilarityValidator', }, { 'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator', }, { 'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator', }, { 'NAME': 'django.contrib.auth.password_validation.NumericPasswordValidator', }, ] # Internationalization # https://docs.djangoproject.com/en/3.2/topics/i18n/ LANGUAGE_CODE = 'en-us' TIME_ZONE = 'UTC' USE_I18N = True USE_L10N = True USE_TZ = True # Static files (CSS, JavaScript, Images) # https://docs.djangoproject.com/en/3.2/howto/static-files/ STATIC_URL = '/static/' # Default primary key field type # https://docs.djangoproject.com/en/3.2/ref/settings/#default-auto-field DEFAULT_AUTO_FIELD = 'django.db.models.BigAutoField'
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/__init__.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/wsgi.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/wsgi.py
""" WSGI config for nft_web project. It exposes the WSGI callable as a module-level variable named ``application``. For more information on this file, see https://docs.djangoproject.com/en/3.2/howto/deployment/wsgi/ """ import os from django.core.wsgi import get_wsgi_application os.environ.setdefault('DJANGO_SETTINGS_MODULE', 'nft_web.settings') application = get_wsgi_application()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/urls.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/nft_web/urls.py
"""nft_web URL Configuration The `urlpatterns` list routes URLs to views. For more information please see: https://docs.djangoproject.com/en/3.2/topics/http/urls/ Examples: Function views 1. Add an import: from my_app import views 2. Add a URL to urlpatterns: path('', views.home, name='home') Class-based views 1. Add an import: from other_app.views import Home 2. Add a URL to urlpatterns: path('', Home.as_view(), name='home') Including another URLconf 1. Import the include() function: from django.urls import include, path 2. Add a URL to urlpatterns: path('blog/', include('blog.urls')) """ from django.contrib import admin from django.urls import include, path urlpatterns = [ path('', include('account.urls')), ]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/views.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/views.py
from django.shortcuts import render from django.http import HttpResponse, HttpResponseRedirect, Http404 from django.template import loader from django.core.validators import URLValidator, validate_ipv4_address from .models import User from .apps import AccountConfig from .eth import Account, Contract, web3 import ipaddress import pyseto import base64 import string import requests import json import hashlib import os nft_path = os.path.join('account', 'storages') def pyseto_decode(token, token_key): token_obj = pyseto.Key.new( version=4, purpose="local", key=token_key ) return pyseto.decode(token_obj, token).payload.decode('utf-8') def get_contract(): with open('./PrivateNFT.json', 'rb') as f: build_json = json.load(f) contract = Contract(build_json) return contract.at(AccountConfig.nft_addr) def get_response(uri): if uri.startswith('http://') or uri.startswith('https://'): validator = URLValidator() result = requests.get(uri, timeout=3) try: validator(uri) result = requests.get(uri, timeout=3) except: return return result.text elif any([uri.startswith(str(i)) for i in range(1, 10)]) and uri.find('/') != -1: ip = uri.split('/')[0] if uri.find('..') != -1 or not uri.startswith(os.path.join(ip, nft_path + '/')): return try: validate_ipv4_address(ip) except: return ipv4 = ipaddress.IPv4Address(ip) if str(ipv4) not in ['127.0.0.1', '0.0.0.0']: return nft_file = uri.split(nft_path + '/')[-1] if nft_file.find('.') != -1 and nft_file.split('.')[-1]: path = os.path.join(os.getcwd(), nft_path, nft_file) with open(path, 'rb') as f: return f.read() return def index(request): if not request.session.get('user_id', ''): return HttpResponse("login first %s" % AccountConfig.name) user_id = request.session.get('user_id', '') token = request.session.get('token', '') token_key = request.session.get('token_key', '') private_key = pyseto_decode(token, token_key) account = Account(private_key=private_key) return HttpResponse("Hello, %s\nprivate key: %s\ncontract address: %s" % (user_id, private_key, account.address)) def login(request): user_id = request.GET.get('user_id', '') user_pw = request.GET.get('user_pw', '') if not user_id or not user_pw: return HttpResponse("empty parameter") try: user_obj = User.objects.get(user_id=user_id) if user_obj.user_pw != user_pw: return HttpResponse("user id or user pw is incorrect"); except: return HttpResponse("user id or user pw is incorrect"); request.session['user_id'] = user_obj.user_id request.session['token'] = user_obj.token request.session['token_key'] = user_obj.token_key return HttpResponseRedirect("/") def regist(request): user_id = request.GET.get('user_id', '') user_pw = request.GET.get('user_pw', '') if not user_id or not user_pw: return HttpResponse("empty parameter") if any([user_id.count(data) for data in list(string.punctuation + ' ')]): return HttpResponse("invalid user id"); if User.objects.filter(user_id=user_id).exists(): return HttpResponse("exist user id"); account = Account() assert account.private_key with open('/dev/urandom', 'rb') as f: token_key = base64.b64encode(f.read(128)).decode('utf-8')[:64] token_obj = pyseto.Key.new( version=4, purpose="local", key=token_key ) token = pyseto.encode(token_obj, payload=account.private_key).decode('utf-8') u = User(user_id=user_id, user_pw=user_pw, token=token, token_key=token_key) u.save() return HttpResponse("registered successfully") def nfts(request, user_id): if not User.objects.filter(user_id=user_id).exists(): return HttpResponse("no exist"); if request.session.get('user_id', '') != user_id: return HttpResponse("no authorzation"); user = User.objects.get(user_id=user_id) token = request.session.get('token', '') token_key = request.session.get('token_key', '') private_key = pyseto_decode(token, token_key) account = Account(private_key=private_key) contract = get_contract() ids = contract.getIDs().call({'from':account.address}) result = "" cache_path = os.path.join(os.getcwd(), nft_path, user_id + hashlib.sha1(bytes(private_key.encode('utf-8'))).hexdigest() ) if not user.is_cached: for tid in ids: uri = contract.getTokenURI(tid).call({'from':account.address}) if not uri: continue resp = get_response(uri) if not resp: continue try: json_res = json.loads(resp) for key in list(json_res.keys()): if key in ['name', 'description']: result += f'<br/>{key}: {json_res[key]}' elif key == 'image': result += f'<br/>{key}: <img src=\"{json_res[key]}\"/>' result += "<br/>" except: result += f"<br/>malformed {uri}: {resp}" if len(ids) == 3: with open(cache_path, 'wb') as f: f.write(result.encode('utf-8')) user.is_cached = True user.save() else: with open(cache_path, 'rb') as f: result = f.read().decode('utf-8') return HttpResponse("= NFT list =" + result) def logout(request): session_keys = list(request.session.keys())[::] for key in session_keys: del request.session[key] return HttpResponseRedirect("/")
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/eth.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/eth.py
from typing import Any, Dict, List, Optional, Union import rlp from brownie.exceptions import VirtualMachineError from eth_typing import ChecksumAddress from eth_utils import keccak, to_checksum_address from hexbytes import HexBytes from web3 import Web3 from web3.contract import ContractFunctions class Account: def __init__(self, private_key: Union[int, bytes, str] = None) -> None: if private_key is None: w3account = web3.eth.account.create() else: w3account = web3.eth.account.from_key(private_key) self._account = w3account self.address = self._account.address self.private_key = HexBytes(self._account.key).hex() def balance(self) -> int: balance = web3.eth.get_balance(self.address) return balance @property def nonce(self) -> int: return web3.eth.get_transaction_count(self.address) def get_deployment_address(self, nonce: Optional[int] = None) -> ChecksumAddress: if nonce is None: nonce = self.nonce address = HexBytes(self.address) raw = rlp.encode([address, nonce]) deployment_address = HexBytes(keccak(raw)[12:]).hex() return to_checksum_address(deployment_address) def transact(self, tx: Dict) -> str: tx["chainId"] = web3.eth.chain_id tx["from"] = self.address try: signed_tx = self._account.sign_transaction(tx).rawTransaction # type: ignore txid = web3.eth.send_raw_transaction(signed_tx) except ValueError as e: exc = VirtualMachineError(e) if not hasattr(exc, "txid"): raise exc from None else: return txid.hex() class Contract: def __init__(self, build: Dict) -> None: self._build = build.copy() self.bytecode = build["bytecode"] self.deploy = ContractConstructor(self) @property def abi(self) -> List: return self._build["abi"] def at(self, address: ChecksumAddress) -> ContractFunctions: return web3.eth.contract(address=address, abi=self.abi).functions class ContractConstructor: def __init__(self, parent: "Contract") -> None: self._instance = web3.eth.contract(abi=parent.abi, bytecode=parent.bytecode) def __call__( self, sender: Account, value: int = 0, args: Optional[Any] = None, gas_limit: Optional[int] = None, gas_price: Optional[int] = None, nonce: Optional[int] = None, ) -> str: tx: Dict = self._instance.constructor(*args).buildTransaction() return sender.transact( { "value": value, "nonce": nonce if nonce is not None else sender.nonce, "gas": gas_limit or tx["gas"], "gasPrice": gas_price or tx["gasPrice"], "data": tx["data"], }, ) def estimate_gas(self, args: Optional[Any] = None) -> int: return self._instance.constructor(*args).estimateGas() web3 = Web3()
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/models.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/models.py
from django.db import models # Create your models here. class User(models.Model): user_id = models.CharField(max_length=128) user_pw = models.CharField(max_length=128) token = models.CharField(max_length=512) token_key = models.CharField(max_length=512) is_cached = models.BooleanField(default=False) def __str__(self): return self.user_id
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/__init__.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/__init__.py
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/tests.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/tests.py
from django.test import TestCase # Create your tests here.
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/apps.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/apps.py
from django.apps import AppConfig from .eth import Account, Contract, web3 import os class AccountConfig(AppConfig): default_auto_field = 'django.db.models.BigAutoField' name = 'account' nft_addr = open(os.path.join(os.getcwd(), 'contract_addr.txt'), 'rb').read().strip().decode('utf-8')
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false
sajjadium/ctf-archives
https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/urls.py
ctfs/Codegate/2022/Quals/crypto/nft/nft_web/account/urls.py
from django.urls import path from . import views urlpatterns = [ path('', views.index, name='index'), path('login', views.login, name='login'), path('regist', views.regist, name='regist'), path('logout', views.logout, name='logout'), path('<str:user_id>/nfts/', views.nfts, name='nfts'), ]
python
MIT
129a3a9fe604443211fa4d493a49630c30689df7
2026-01-05T01:34:13.869332Z
false