cryptoPromedium
Кастом (Custom)
hackerlab
Task: Decrypt a custom substitution cipher where the seed depends on the filename. Solution: Used Known Plaintext Attack with flag format CODEBY{} and leetspeak pattern recognition to recover the substitution mapping.
$ ls tags/ techniques/
substitution_cipherleetspeakknown_plaintext_attackflag_format_attackpython_randomcustom_cipherprng_seed
Known Plaintext Attack using flag formatSubstitution cipher reversalLeetspeak pattern recognition
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][Pro]Anime Track Cipher— hackerlab
- [crypto][Pro]Напиши мне— hackerlab
- [crypto][Pro]Шайтан-алгоритм (Shaitan Algorithm)— hackerlab
- [reverse][Pro]Забытый пароль (Forgotten Password)— duckerz
- [crypto][Pro]Забытый (Forgotten)— hackerlab