Tags: misc encoding 

Rating:

# Defcamp 2018 Quals: Message

![date](https://img.shields.io/badge/date-22.09.2018-brightgreen.svg)
![solved in time of CTF](https://img.shields.io/badge/solved-in%20time%20of%20CTF-brightgreen.svg)
![misc category](https://img.shields.io/badge/category-misc-lightgrey.svg)
![score](https://img.shields.io/badge/score-50-blue.svg)
![solves](https://img.shields.io/badge/solves-87-brightgreen.svg)

## Description
I just typed this secret [message](/message.txt) with my new encoding algorithm.

## Summary
Understand and solve the custom encoding algorithm

## Flag
```
DCTF{b66ecaaa90ad05df5dab33d71a8f70934408f3a5847a4c5c38db75891b0f0e32}
```

## Detailed solution
Opening the given encoded file, we observe that there is a lot of junk strings(*“qwerty”*, *“asdfgh”*, *“zxcvbn”*) that must be removed. After, we identify a **pair of brackets** inside that must be the hash.
There are **digits**, that must be treated as such, and **sequences of characters**. After a lucky guess, we observe that this is a **drawing on the keyboard**. We made a webpage [index.html](highlight/index.html)(that takes a parameter key with this sequence and highlight them on a graphical animation of a keyboard) and a [script](decode.py)(that helps us with contruction of the flag).

![Image of highlighting](highlight/example.jpg)

Original writeup (https://github.com/iosifache/CTF-writeups/blob/master/misc/message/writeup.md).