๐ EtTuCaesar
A detailed write-up of the Crypto challenge 'EtTuCaesar' from WolvCTF - 2025
๐ Challenge Overview
Category Details Additional Info ๐ Event WolvCTF - 2025 Event Link ๐ฐ Category Crypto ๐ ๐ Points 50 Out of 500 total โญ Difficulty ๐ข Easy Personal Rating: 2/10 ๐ค Author shlswnt Profile ๐ฎ Solves (At the time of flag submission) 4 solve rate ๐ Date 23-03-2025 WolvCTF - 2025 ๐ฆพ Solved By mH4ck3r0n3 Team: QnQSec
๐ Challenge Information
Caesar has left a you a note encrypted with his favorite cipher, but he seems to have jumbled things even further. Can you restore his message?
- A Caesar salad isnโt complete without a good tossโmaybe try unscrambling it from different angles?
- What if I put the note in the shape of a square?
๐ฏ Challenge Files & Infrastructure
Provided Files
Files:
๐ Initial Analysis
First Steps
The first thing that came to my mind given the challenge title was the Caesar cipher. Reading the text from the attached file:
tzc3Sq{k!ss!a!__FZ!!_!11}
, I confirmed this idea. Since the first hint tells us to unscramble the message, I thought about the shift applied by the Caesar cipher. Then, we are instructed to arrange the decoded text in the form of a square. Let’s move on to the next phase.
๐ฌ Vulnerability Analysis
Potential Vulnerabilities
- Caesar Cipher
๐ฏ Solution Path
Exploitation Steps
Initial setup
The first thing I did was apply the Caesar cipher to the given text (https://www.dcode.fr/caesar-cipher):
increasing the shift until I found a text containing all the characters of the flag format (
wctf{}
).
Exploitation
Once I obtained the text, I extracted its length using
python
:As we can see, it is
25
characters long. I extracted the length because the text needs to be arranged in the form of a square. By calculating $\sqrt{25}=5$, I determined the number of characters per row and the number of rows, since a square consists of $n^2$ elements. Then, I created the table:
1 2 3 4 5 w c f 3 V t { n ! v v ! d ! _ _ I C ! ! _ ! 1 1 } It immediately stood out to me that the flag should be read diagonally, as some words form the famous phrase of Julius Caesar: Veni Vidi Vici.
Flag capture
๐ ๏ธ Exploitation Process
Approach
The automatic exploit applies the Caesar cipher to the message text. Then, it inserts it into a
5x5 matrix
and constructs the flag as previously described.
๐ฉ Flag Capture
Flagwctf{v3n!_V!dI_v!C!_!1!1}
Proof of Execution
๐ง Tools Used
Tool Purpose Python Exploit
๐ก Key Learnings
Skills Improved
- Binary Exploitation
- Reverse Engineering
- Web Exploitation
- Cryptography
- Forensics
- OSINT
- Miscellaneous
๐ References & Resources
Learning Resources
๐ Final Statistics
Metric | Value | Notes |
---|---|---|
Time to Solve | 00:05 | From start to flag |
Global Ranking (At the time of flag submission) | 7/424 | Challenge ranking |
Points Earned | 50 | Team contribution |
Created: 23-03-2025 โข Last Modified: 23-03-2025 Author: mH4ck3r0n3 โข Team: QnQSec