-
Notifications
You must be signed in to change notification settings - Fork 0
/
CTF_R0_Hash breaker.py
40 lines (31 loc) · 1.01 KB
/
CTF_R0_Hash breaker.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
#!/usr/bin/env python
import requests
import hashlib
import urllib2
import re
from lxml import html
import binascii
#Challenge Information
#https://ringzer0ctf.com/challenges/56
#CURRENTLY UNDER CONSTRUCTION!!!!!!!!!!!!!!!!
#cookie storage
session_name = 'PHPSESSID'
session_value = '<CookieValue>'
#cookie session
session = requests.Session()
jar = requests.cookies.RequestsCookieJar()
jar.set(session_name, session_value)
session.cookies = jar
#request session
inspected_webpage = session.get('https://ringzer0ctf.com/challenges/56/')
#pull webcontent
tree = html.fromstring(inspected_webpage.content)
#scrape everything from class "message"
export_html = tree.xpath('string(//div[@class="message"])')
#Grab message of binary data
#remove spaces and dashes
export_rsad = re.sub("[^a-zA-Z0-9]", "", export_html)
#removing specific words (WORKS BUT REDUNDANT AND SLOPPY!!)
export_rbm = re.sub("BEGINHASH", "", export_rsad)
export_rbem = re.sub("ENDHASH", "", export_rbm)
print(export_rbem)