PicoCTF-2022 Writeup
  • README
  • Binary Exploitation
    • buffer overflow 1
    • buffer overflow 2
    • buffer overflow 3
    • flag leak
    • function overwrite
    • ropfu
    • stack cache
    • x-sixty-what
  • Cryptography
    • basic-mod1
    • basic-mod2
    • diffie-hellman
    • morse-code
    • NSA Backdoor
    • Sequences
    • substitution
    • Sum-O-Primes
    • Very Smooth
  • Forensics
    • Operation Oni
    • Operation Orchid
    • SideChannel
    • St3g0
    • Torrent Analyze
  • Reverse Engineering
    • Bbbbloat
    • Keygenme
    • unpackme
    • Wizardlike
  • Web Exploitation
    • Forbidden Paths
    • noted
    • Roboto Sans
    • SQLiLite
Powered by GitBook
On this page
  • Challenge
  • Solution
  • Flag

Was this helpful?

Edit on GitHub
  1. Cryptography

substitution

PreviousSequencesNextSum-O-Primes

Last updated 3 years ago

Was this helpful?

Challenge

  • substitution0:

  • substitution1:

  • substitution2:

Solution

Use . For substitution2, set the solve mode to "statistics."

Flag

  • substitution0: picoCTF{5UB5717U710N_3V0LU710N_59533A2E}

  • substitution1: picoCTF{FR3QU3NCY_4774CK5_4R3_C001_4871E6FB}

  • substitution2: picoCTF{N6R4M_4N41Y515_15_73D10U5_8E1BF808}

https://artifacts.picoctf.net/c/379/message.txt
https://artifacts.picoctf.net/c/414/message.txt
https://artifacts.picoctf.net/c/107/message.txt
quipqiup.com