We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I have this example:
flag{ ⊕ fe9xw = 0x0009581F0C
flag{
fe9xw
When I try to brute force with a known key length - can't find the solution:
$ cat xor2.hex 0009581F0C $ xortool -b -l 5 -x xor2.hex 256 possible key(s) of length 5: \x00\tX\x1f\x0c \x01\x08Y\x1e\r \x02\x0bZ\x1d\x0e \x03\n[\x1c\x0f \x04\r\\\x1b\x08 ... Found 100 plaintexts with 95%+ valid characters See files filename-key.csv, filename-char_used-perc_valid.csv grep flag xortool_out/* -r $ $ xortool -o -l 5 -x xor2.hex 100 possible key(s) of length 5: 09h/< 18i.= 2;j-> 3:k,? 4=l+8 ... Found 100 plaintexts with 95%+ valid characters See files filename-key.csv, filename-char_used-perc_valid.csv grep flag xortool_out/* -r $
What am I doing wrong?
The text was updated successfully, but these errors were encountered:
No branches or pull requests
I have this example:
flag{
⊕fe9xw
= 0x0009581F0CWhen I try to brute force with a known key length - can't find the solution:
What am I doing wrong?
The text was updated successfully, but these errors were encountered: