Files
SecGen/modules/generators/challenges/encoded_diff/secgen_metadata.xml
thomashaw 241e83a7a9 generators/random/random_hex: added number_of_lines and line_length params
generators/challenges/encoded_diff: encodes a flag in hex, generates random_hex, shuffles the ordering, inserts a flag in a random position. accounts for line length vs flag length with random hex padding.
secgen_functions::leak_file.pp: Added division between data leaked to the same file
2017-03-28 10:51:57 +01:00

41 lines
1.3 KiB
XML

<?xml version="1.0"?>
<generator xmlns="http://www.github/cliffe/SecGen/generator"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/generator">
<name>Encoded Diff Challenge</name>
<author>Thomas Shaw</author>
<module_license>MIT</module_license>
<description>Generates a challenge which requires the diff tool to find the encoded flag. Returns two sets of data
that needs to sorting, diffing and converting from hex to ascii.
</description>
<type>ctf_challenge</type>
<type>string_generator</type>
<platform>linux</platform>
<read_fact>random_data</read_fact>
<read_fact>strings_to_leak</read_fact>
<default_input into="random_data">
<generator module_path="modules/generators/random/random_hex">
<input into="line_length">
<value>20</value>
</input>
<input into="number_of_lines">
<value>20</value>
</input>
</generator>
</default_input>
<!-- Uses string_to_leak[0] as the flag to hide. -->
<default_input into="strings_to_leak">
<encoder type="hex_encoder">
<input into="strings_to_encode">
<generator type="flag_generator"/>
</input>
</encoder>
</default_input>
<output_type>multiple_strings</output_type>
</generator>