O'Reilly logo

Kali Linux CTF Blueprints by Cameron Buchanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Scenario 2 – encode + Python = merry hell

Having covered the basics, now we move onto something a bit more interesting and complicated. String manipulation can be an interesting way to create unique encoding methods. A simple way of doing this is using the string library to perform simple transforms on the text.

This is not cryptographically secure, but it does teach good decoding skills and can be easily edited to create new substitution ciphers. Please don't ever use this method to make legitimate solutions. This is, by far, one of the worst ways of doing things. It's a prime example of security through obscurity and therefore flawed in every aspect.

Setup

The script that we're going to use is really basic and can be found in the next snippet. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required