# crackers
Excel File (.xlsx) Password Cracking CTF Challenge (YBN CTF 2024)
### Challenge Details
> Title: crackers
> Description: I managed to hack into this business and I swear there was some important information in here! All i know is that its the end but i dont know what this means????\
> Attachments: https://ctf.ybn.sg/files/c55375e194d788f6ae848cab541ad3a0/BusinessDocuments.xlsx \
> Instance: -
This challenge presents us with an Excel document that seems to password protected.
1. Get `office2john.py` from [here](https://github.com/openwall/john/raw/refs/heads/bleeding-jumbo/run/office2john.py)
2. `python3 office2john.py > hash.txt`
3. Edit `hash.txt` to remove the leading filename and colon. It should like this:
```
$office$*2013*100000*256*16*81ba2515e744c74a330c4dc216b76a1f*c186a31266f1cedb5045d81b0180ad3c*d058672755a76f82ff1f1b4945353e514519bcb5f4fc5372c81c704675459bf5
```
4. Make sure you have `rockyou.txt` beforehand. Run:
```
hashcat -m 9600 -o cracked.txt hash.txt rockyou.txt
```
5. The password to the document will be displayed at the end:
```
$office$*2013*100000*256*16*81ba2515e744c74a330c4dc216b76a1f*c186a31266f1cedb5045d81b0180ad3c*d058672755a76f82ff1f1b4945353e514519bcb5f4fc5372c81c704675459bf5:dungeon
```
In this case the password was `dungeon`.
You can use `msoffcrypto-tool` from [here](https://github.com/nolze/msoffcrypto-tool) to decrypt the file:
```
msoffcrypto-tool BusinessDocuments.xlsx decrypted.xlsx -p dungeon
```
And then you can open it up in Excel.
Now, cause i'm an idiot i didn't pick up the hint in the challenge description for where I should be looking for the flag.
> "I managed to hack into this business and I swear there was some important information in here! All i know is that **its the end** but i dont know what this means????" \
The intended solve from here was to go the bottom right corner of the spreadsheet and get the flag. \
This could be achieved with Ctrl + DOWN and Ctrl + RIGHT.
So yeah, needless to say I went about things differently. \
Press Ctrl + F and then search for "_", then press "Find All" and scroll to the bottom. You should see this: \

Click on any one of the two suspicious entries and you will see the flag.
Flag:
:::spoiler Flag
YBN24{Y0u_cr4ck3d_m3}
:::
\
\
\
Main Writeups Page: https://hackmd.io/@ctf-lol/ybnctf2024