Contents

๐Ÿ” EtTuCaesar

A detailed write-up of the Crypto challenge 'EtTuCaesar' from WolvCTF - 2025

/images/WolvCTF-2025/Crypto/EtTuCaesar/challenge_presentation.png
Challenge Presentation

๐Ÿ“Š Challenge Overview

Category Details Additional Info
๐Ÿ† Event WolvCTF - 2025 Event Link
๐Ÿ”ฐ Category Crypto ๐Ÿ”
๐Ÿ’Ž Points 50 Out of 500 total
โญ Difficulty ๐ŸŸข Easy Personal Rating: 2/10
๐Ÿ‘ค Author shlswnt Profile
๐ŸŽฎ Solves (At the time of flag submission) 4 solve rate
๐Ÿ“… Date 23-03-2025 WolvCTF - 2025
๐Ÿฆพ Solved By mH4ck3r0n3 Team: QnQSec

๐Ÿ“ Challenge Information

Caesar has left a you a note encrypted with his favorite cipher, but he seems to have jumbled things even further. Can you restore his message?

  • A Caesar salad isnโ€™t complete without a good tossโ€”maybe try unscrambling it from different angles?
  • What if I put the note in the shape of a square?

๐ŸŽฏ Challenge Files & Infrastructure

Provided Files

Files:

๐Ÿ” Initial Analysis

First Steps

The first thing that came to my mind given the challenge title was the Caesar cipher. Reading the text from the attached file: tzc3Sq{k!ss!a!__FZ!!_!11}, I confirmed this idea. Since the first hint tells us to unscramble the message, I thought about the shift applied by the Caesar cipher. Then, we are instructed to arrange the decoded text in the form of a square. Let’s move on to the next phase.

๐Ÿ”ฌ Vulnerability Analysis

Potential Vulnerabilities

  • Caesar Cipher

๐ŸŽฏ Solution Path

Exploitation Steps

Initial setup

The first thing I did was apply the Caesar cipher to the given text (https://www.dcode.fr/caesar-cipher):

/images/WolvCTF-2025/Crypto/EtTuCaesar/cesar.png
Caesar Cipher

increasing the shift until I found a text containing all the characters of the flag format (wctf{}).

Exploitation

Once I obtained the text, I extracted its length using python:

/images/WolvCTF-2025/Crypto/EtTuCaesar/len.png
Length

As we can see, it is 25 characters long. I extracted the length because the text needs to be arranged in the form of a square. By calculating $\sqrt{25}=5$, I determined the number of characters per row and the number of rows, since a square consists of $n^2$ elements. Then, I created the table:

1 2 3 4 5
w c f 3 V
t { n ! v
v ! d ! _
_ I C ! !
_ ! 1 1 }

It immediately stood out to me that the flag should be read diagonally, as some words form the famous phrase of Julius Caesar: Veni Vidi Vici.

Flag capture

/images/WolvCTF-2025/Crypto/EtTuCaesar/manual_flag.png
Manual Flag

๐Ÿ› ๏ธ Exploitation Process

Approach

The automatic exploit applies the Caesar cipher to the message text. Then, it inserts it into a 5x5 matrix and constructs the flag as previously described.

๐Ÿšฉ Flag Capture

Flag

wctf{v3n!_V!dI_v!C!_!1!1}

Proof of Execution

/images/WolvCTF-2025/Crypto/EtTuCaesar/automated_flag.png
Automated Flag
Screenshot of successful exploitation

๐Ÿ”ง Tools Used

Tool Purpose
Python Exploit

๐Ÿ’ก Key Learnings

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

๐Ÿ“š References & Resources

Learning Resources


๐Ÿ“Š Final Statistics

Metric Value Notes
Time to Solve 00:05 From start to flag
Global Ranking (At the time of flag submission) 7/424 Challenge ranking
Points Earned 50 Team contribution

Created: 23-03-2025 โ€ข Last Modified: 23-03-2025 Author: mH4ck3r0n3 โ€ข Team: QnQSec