Here are some tools that can be helpful in a ctf event. It is possible that you may not get your answer from the following tools. Keep looking, keep hacking.
Tool | Application |
---|---|
pngcheck | Checking errors in png file |
PCRT | Python 2 based module to correct png files |
Zsteg | Ruby based tool for steganography |
tweakPNG | Application to correct, check and edit png |
Forensically Beta | Online tool for steganography, use it for magnification tool, geotags and string extraction |
StegSolver | Steganography solver. |
Algorithm | Link |
---|---|
Sha1 | link |
Sha256 | link |
md5 | link1 link2 |
All | link This can tell the type of hashing too. |
ASCII85 and other weirdos | link |
Conversions | Rapid Tables |
Algorithm | Link |
---|---|
John The Ripper | Its primary purpose is to detect weak Unix passwords. |
FcrackZip | Fast password cracker that even performs Brute force attack |
QR readers use different algorithms to decode choose which algorithm and corresponding tool you need.
Links |
---|
QR Reader 1 |
QR Reader 2 |
Tool | Application |
---|---|
wireshark | Analysing data packets over internet |
MTP | Keys in One-time pad encryption (OTP) should only be used once, when they get reused we can do a Many-time pad attack. MTP Interactive uses automated cryptanalysis to present a partial decryption which can be solved interactively. |