<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Boston Key Party on System Overlord</title><link>https://systemoverlord.com/tags/boston-key-party.html</link><description>Recent content in Boston Key Party on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Mon, 10 Mar 2014 21:29:13 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/boston-key-party/index.xml" rel="self" type="application/rss+xml"/><item><title>Boston Key Party: Mind Your Ps and Qs</title><link>https://systemoverlord.com/2014/03/10/boston-key-party-mind-your-ps-and-qs/</link><pubDate>Mon, 10 Mar 2014 21:29:13 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/03/10/boston-key-party-mind-your-ps-and-qs/</guid><description>&lt;p&gt;About a week old, but I thought I&amp;rsquo;d put together a writeup for mind your Ps and Qs because I thought it was an interesting challenge.&lt;/p&gt;
&lt;p&gt;You are provided 24 RSA public keys and 24 messages, and the messages are encrypted using RSA-OAEP using the private components to the keys. The flag is spread around the 24 messages.&lt;/p&gt;
&lt;p&gt;So, we begin with an analysis of the problem. If they&amp;rsquo;re using RSA-OAEP, then we&amp;rsquo;re not going to attack the ciphertext directly. While RSA-OAEP might be vulnerable to timing attacks, we&amp;rsquo;re not on a network service, and there are no known ciphertext-only attacks on RSA-OAEP. So how are the keys themselves? Looking at them, we have a ~1024 bit modulus:&lt;/p&gt;</description></item><item><title>Boston Key Party -- MITM</title><link>https://systemoverlord.com/2013/06/10/boston-key-party-mitm/</link><pubDate>Mon, 10 Jun 2013 00:54:54 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/06/10/boston-key-party-mitm/</guid><description>&lt;p&gt;Boston Key Party is the latest CTF I've played in (this time playing with some local friends as part of our team 'Shadow Cats'). The first challenge we cleared (actually, first blood in the CTF) was MITM.&lt;/p&gt;
&lt;p&gt;Now, you might think a challenge named "MITM" was some sort of Man-In-The-Middle exercise, but it's actually crypto! We're given five base-64 encoded messages: two plaintext/ciphertext pairs, and a ciphertext (which we're presumably supposed to decrypt).&lt;/p&gt;</description></item></channel></rss>