This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
import random | |
from struct import pack | |
from struct import unpack | |
from scipy import linalg | |
def Str2matrix(s): | |
#convert string to 4x4 matrix | |
return [map(lambda x : ord(x), list(s[i:i+4])) for i in xrange(0, len(s), 4)] | |
def Matrix2str(m): | |
#convert matrix to string | |
return ''.join(map(lambda x : ''.join(map(lambda y : pack('!H', y), x)), m)) | |
def mMatrix2str(m): | |
return ''.join(map(lambda x : ''.join(map(lambda y : pack('!B', y), x)), m)) | |
def Generate(password): | |
#generate key matrix | |
random.seed(password) | |
return [[random.randint(0,64) for i in xrange(4)] for j in xrange(4)] | |
def Multiply(A,B): | |
#multiply two 4x4 matrix | |
C = [[0 for i in xrange(4)] for j in xrange(4)] | |
for i in xrange(4): | |
for j in xrange(4): | |
for k in xrange(4): | |
C[i][j] += (A[i][k] * B[k][j]) | |
return C | |
def Encrypt(fname): | |
#encrypt file | |
key = Generate('') | |
data = open(fname, 'rb').read() | |
length = pack('!I', len(data)) | |
while len(data) % 16 != 0: | |
data += '\x00' | |
out = open(fname + '.out', 'wb') | |
out.write(length) | |
for i in xrange(0, len(data), 16): | |
print Str2matrix(data[i:i+16]) | |
cipher = Multiply(Str2matrix(data[i:i+16]), key) | |
out.write(Matrix2str(cipher)) | |
out.close() | |
Encrypt('sample.wmv') | |
The key to this challenge was to take a look at the specification for the file format.
A WMV file is in most circumstances encapsulated in the Advanced Systems Format (ASF) container format.Looking at the ASF specification, these types of file usually start with a 16 byte GUID that identifies the file type. This hints at a known-plaintext attack. Using some basic linear algebra, given the plaintext and the ciphertext for the first 16 bytes of the file, it is possible to recover the key matrix. Once this key matrix is recovered, the rest of the file can be decrypted and the original wmv file can be recovered. The details of the steps involving the calculations are explained in comments in the code below.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from scipy import linalg | |
import numpy as np | |
from struct import pack,unpack | |
import sys | |
filename = 'flag.wmv' if len(sys.argv)==1 else sys.argv[1] | |
m_transform = np.frompyfunc(lambda x: int(round(x)),1,1) | |
header_byte_seq = [0x30,0x26,0xB2,0x75,0x8E,0x66,0xCF,0x11,0xA6,0xD9,0x00,0xAA,0x00,0x62,0xCE,0x6C] | |
#turn header_byte_seq into a 4x4 matrix | |
hbs_matrix = np.array( header_byte_seq ).reshape(4,4) | |
#get ciphertext | |
ciphertext_file = open(filename+'.out','rb') | |
ciphertext = ciphertext_file.read() | |
ciphertext_file.close() | |
#ciphertext was packed as a series of shorts | |
#get length | |
length = unpack('!I',ciphertext[0:4])[0] | |
ciphertext = ciphertext[4:] | |
#convert into list integers | |
ciphertext = [ unpack('!H',ciphertext[i*2:i*2+2])[0] for i in range(0,length) ] | |
#first 16 bytes hold the header guid | |
hbs_ciphertext = ciphertext[0:16] | |
#RECOVER KEY USED FOR ENCRYPTION | |
# Let hbs_matrix = B | |
# Let key = K | |
# Let hbs_ciphertext = C | |
# BK = C | |
# (B^(-1)B)K = B^(-1)C | |
# K = B^(-1)C | |
B = hbs_matrix | |
C = np.array(hbs_ciphertext).reshape(4,4) | |
B_inverse = linalg.inv(B) | |
K = m_transform(B_inverse.dot(C)) | |
#RECOVER ORIGINAL DATA GIVEN KEY AND CIPHERTEXT | |
# BK = C | |
# BK.K^(1) = C.K^(-1) | |
# B = C.K^(-1) | |
K_inverse = linalg.inv(K) | |
plaintext = [] | |
for i in range(0,length/16): | |
C = ciphertext[i*16:i*16+16] | |
C = np.array(C).reshape(4,4) | |
B = m_transform(C.dot(K_inverse)) | |
plaintext += [x for x in B.reshape(1,16)[0]] | |
#WRITE DECRYPTED DATA TO FILE | |
decrypted_file = open(filename,'wb') | |
data = ''.join( pack('!B',x) for x in plaintext ) | |
decrypted_file.write(data) | |
decrypted_file.close() |
Once the file has been decrypted, the wmv file is playable and it reveals the flag.
No comments:
Post a Comment