This was an interesting hardware challenge. I really enjoyed solving it. The method I used was to brute-force each pair of bytes. There might be another method to solve this challenge by studying the output and input results generated by the circuit and trying to find a pattern.
Challenge Description
The following pictures were given with the challenge:
The flag was entered into the input, and its output was subsequently stored in the RAM, as depicted in the image below:
A file named RAM_output.txt
was also given, here’s the content of it:
8094
6514
e9f3
cc9b
a618
f075
eae8
30db
899f
6c8d
4bf2
34eb
30db
b53a
c777
0d65
We were also given a logisim
project that has the circuit, which will be helpful in understanding the circuit and in testing our solutions later on.
Analysis
Analyzing the circuit, we can notice that each pair of bytes is XORed with random bits of each other. So there’s no particular key in this challenge; it just uses a basic algorithm to encode the flag by XORing each pair of bytes with each other’s bits. As shown in the pictures below, the two bytes are taken from the input, fed into the XOR ports, and the output of each XOR port is then taken and combined into two bytes that will be stored in the RAM.
Solution
With the results of our analysis, we’ll need to replicate the circuit in a programmable manner so that we’ll be able to encode any two bytes of data the same way the circuit does. Since it’s only two bytes, I think brute-forcing our way will be faster than trying to reverse the full flag. So, let’s first create a multi-input XOR port that will XOR specific bits by given indexes.
def xor_bits(bits, indexes):
r = bits[indexes[0]]
for i in indexes[1:]:
r ^= bits[i]
return r
Next up, using the full circuit as a reference (the picture below), I followed each connection of the 16 XOR ports and got the input indexes of each port to map them into the output.
Using those mappings, I created the following function. It takes a bit vector as input and returns the value that the circuit would produce for the same bit vector.
def xor(bits):
output = [0] * 16
output[15] = xor_bits(bits, [15, 13, 10, 9, 7, 6, 5, 2, 1])
output[14] = xor_bits(bits, [15, 14, 9, 3, 2, 1])
output[13] = xor_bits(bits, [14, 13, 12, 11, 10, 9, 7, 5, 4, 3, 1])
output[12] = xor_bits(bits, [15, 14, 13, 12, 11, 8, 6, 5, 4, 3])
output[11] = xor_bits(bits, [12, 11, 10, 6, 5, 2, 1])
output[10] = xor_bits(bits, [15, 11, 9, 6, 3, 0])
output[9] = xor_bits(bits, [14, 10, 9, 8, 7, 5, 4, 1, 0])
output[8] = xor_bits(bits, [11, 10, 9, 8, 7, 6, 4, 2, 0])
output[7] = xor_bits(bits, [15, 14, 12, 11, 9, 8, 7, 6, 5, 4, 2, 0])
output[6] = xor_bits(bits, [15, 13, 12, 10, 9, 8, 6, 5, 1, 0])
output[5] = xor_bits(bits, [11, 10, 7, 2])
output[4] = xor_bits(bits, [14, 7, 6, 3])
output[3] = xor_bits(bits, [15, 14, 13, 12, 11, 10, 9, 8, 5, 4, 3, 0])
output[2] = xor_bits(bits, [15, 13, 7, 5, 3, 2, 1, 0])
output[1] = xor_bits(bits, [15, 14, 11, 9, 7, 6, 5, 4, 1, 0])
output[0] = xor_bits(bits, [14, 13, 12, 11, 9, 7, 5, 4, 3, 2])
return output
This function, xor(bits)
, generates the output by XORing specific bits of the input bit vector according to the connections in the circuit. The helper function xor_bits(bits, indices)
computes the XOR of bits at the specified indices in the input bit vector.
Here are two more functions that can assist with conversion: int2bits
and bits2int
.
def int2bits(n):
bits = bin(n).replace('0b', '')
if len(bits) < 16:
bits = ('0' * (16 - len(bits))) + bits
bits = bits[::-1]
bits = list(map(int, list(bits)))
return bits
def bits2int(bits):
rbits = bits[::-1]
rbits = list(map(str, rbits))
rbits = '0b' + ''.join(rbits)
return eval(rbits)
The RAM output was given as text file with each line containing a word (2 bytes of data) represented in hex, I wrote a function to load them.
def load_data():
ram_output = open('RAM_output.txt')
data = ram_output.read()
ram_output.close()
words = []
for line in data.split("\n"):
if line:
words += [eval('0x' + line)]
return words
And finally, here’s the brute-forcing part. As we know, the flag will be in ASCII characters, which means bytes from 0x20
to 0x7f
. The script goes through all of the possible combinations, performs the XOR operation, and compares the result with the encoded value. If it is equal, then we have found the original word.
if __name__ == "__main__":
xored_words = load_data()
words = ''
for i in range(len(xored_words)):
xored_word = hex(xored_words[i]).replace('0x', '').rjust(4, '0')
for hn in range(0x20, 0x7f):
for ln in range(0x20, 0x7f):
v = (hn << 8) + ln
w = get_hex(v)
if (w == xored_word):
orw = hex(v).replace('0x', '')
print(xored_word, '->', orw)
words += orw
print("Flag: ", bytes.fromhex(words).decode())
After running the script:
8094 -> 4c33
6514 -> 414b
e9f3 -> 7b58
cc9b -> 3052
a618 -> 5f31
f075 -> 735f
eae8 -> 4561
30db -> 5331
899f -> 6c59
6c8d -> 5f52
4bf2 -> 3376
34eb -> 4572
30db -> 5331
b53a -> 424c
c777 -> 6521
Flag: Â L3AK{X0R_1s_EaS1lY_R3vErS1BLe!
The flag was not complete for some reason. Looking at the RAM_output.txt
file, we see that two bytes have not been decoded: 0d65
. We know that the last byte is clearly }
to conform to the flag format, but I just guessed on the byte 0d
and tried !
, and that was the correct flag: L3AK{X0R_1s_EaS1lY_R3vErS1BLe!!}
.
Full Script
Here’s the full script:
def xor_bits(bits, indexes):
r = bits[indexes[0]]
for i in indexes[1:]:
r ^= bits[i]
return r
def int2bits(n):
bits = bin(n).replace('0b', '')
if len(bits) < 16:
bits = ('0' * (16 - len(bits))) + bits
bits = bits[::-1]
bits = list(map(int, list(bits)))
return bits
def bits2int(bits):
rbits = bits[::-1]
rbits = list(map(str, rbits))
rbits = '0b' + ''.join(rbits)
return eval(rbits)
def xor(bits):
output = [0] * 16
output[15] = xor_bits(bits, [15, 13, 10, 9, 7, 6, 5, 2, 1])
output[14] = xor_bits(bits, [15, 14, 9, 3, 2, 1])
output[13] = xor_bits(bits, [14, 13, 12, 11, 10, 9, 7, 5, 4, 3, 1])
output[12] = xor_bits(bits, [15, 14, 13, 12, 11, 8, 6, 5, 4, 3])
output[11] = xor_bits(bits, [12, 11, 10, 6, 5, 2, 1])
output[10] = xor_bits(bits, [15, 11, 9, 6, 3, 0])
output[9] = xor_bits(bits, [14, 10, 9, 8, 7, 5, 4, 1, 0])
output[8] = xor_bits(bits, [11, 10, 9, 8, 7, 6, 4, 2, 0])
output[7] = xor_bits(bits, [15, 14, 12, 11, 9, 8, 7, 6, 5, 4, 2, 0])
output[6] = xor_bits(bits, [15, 13, 12, 10, 9, 8, 6, 5, 1, 0])
output[5] = xor_bits(bits, [11, 10, 7, 2])
output[4] = xor_bits(bits, [14, 7, 6, 3])
output[3] = xor_bits(bits, [15, 14, 13, 12, 11, 10, 9, 8, 5, 4, 3, 0])
output[2] = xor_bits(bits, [15, 13, 7, 5, 3, 2, 1, 0])
output[1] = xor_bits(bits, [15, 14, 11, 9, 7, 6, 5, 4, 1, 0])
output[0] = xor_bits(bits, [14, 13, 12, 11, 9, 7, 5, 4, 3, 2])
return output
def get_hex(v):
bits = int2bits(v)
xored_bits = xor(bits)
rint = bits2int(xored_bits)
return hex(rint).replace('0x', '')
def load_data():
ram_output = open('RAM_output.txt')
data = ram_output.read()
ram_output.close()
words = []
for line in data.split("\n"):
if line:
words += [eval('0x' + line)]
return words
if __name__ == "__main__":
xored_words = load_data()
words = ''
for i in range(len(xored_words)):
xored_word = hex(xored_words[i]).replace('0x', '').rjust(4, '0')
for hn in range(0x20, 0x7f):
for ln in range(0x20, 0x7f):
v = (hn << 8) + ln
w = get_hex(v)
if (w == xored_word):
orw = hex(v).replace('0x', '')
print(xored_word, '->', orw)
words += orw
print("Flag: ", bytes.fromhex(words).decode())