{"id":6504,"date":"2019-10-04T08:01:06","date_gmt":"2019-10-04T08:01:06","guid":{"rendered":"https:\/\/gtechbooster.com\/?p=6504"},"modified":"2019-10-04T08:01:00","modified_gmt":"2019-10-04T08:01:00","slug":"cyberchef-ultimate-toolbox-from-gchq","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/cyberchef-ultimate-toolbox-from-gchq\/","title":{"rendered":"CyberChef Ultimate Toolbox from GCHQ"},"content":{"rendered":"\n<p>Are all government agencies falling in love with GitHub and open  sourcing their tools?&nbsp;Of course the recent and hottest headlines belong  to NSA&#8217;s release of its reverse engineering tool Ghidra,but this latest  offering from the UK&#8217;s Government Communications Headquarters (GCHQ) should not go unnoticed or be underestimated.<\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2\" style=\"text-align: center;\" id=\"gtech-75339660\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-1499227227\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p>That offering is CyberChef,  a general purpose tool, therefore more useful than the specialized and  niche Ghidra.It&#8217;s a tool that provides functionality that every  developer needs&nbsp;for their day-to-day workload. That range of  functionality is staggeringly large, ranging from the popular  toBase64\/fromBase64 and URL encode\/decode, to encryption with  AES\/DES\/Blowfish and JWT, to Arithmetic and Logic with calc and bitwise  operations, up to Language and Charset conversions.<\/p>\n\n\n\n<p>As such, CyberChef is a tool that can be used in popular scenarios like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Decode a Base64-encoded string<\/li>\n\n\n\n<li>Convert a date and time to a different time zone<\/li>\n\n\n\n<li>Parse a IPv6 address<\/li>\n\n\n\n<li>Convert data from a hexdump, then decompress<\/li>\n\n\n\n<li>Decrypt and disassemble shellcode<\/li>\n\n\n\n<li>Display multiple timestamps as full dates<\/li>\n\n\n\n<li>Carry out different operations on data of different types<\/li>\n\n\n\n<li>Use parts of the input as arguments to operations<\/li>\n\n\n\n<li>Perform AES decryption, extracting the IV from the beginning of the cipher stream<\/li>\n\n\n\n<li>Automatically detect several layers of nested encoding<\/li>\n<\/ul>\n\n\n\n<p>It would be particularly handy when taking part in Hacking CTF competitions.<\/p>\n\n\n\n<p>And that&#8217;s just the tip of the iceberg.The complete list of categories is:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data format<\/li>\n\n\n\n<li>Encryption \/ Encoding<\/li>\n\n\n\n<li>Public Key<\/li>\n\n\n\n<li>Arithmetic \/ Logic<\/li>\n\n\n\n<li>Networking<\/li>\n\n\n\n<li>Language<\/li>\n\n\n\n<li>Utils<\/li>\n\n\n\n<li>Date \/ Time<\/li>\n\n\n\n<li>Compression<\/li>\n\n\n\n<li>Hashing<\/li>\n\n\n\n<li>Code tidy<\/li>\n\n\n\n<li>Forensics<\/li>\n\n\n\n<li>Multimedia<\/li>\n\n\n\n<li>Flow control<\/li>\n\n\n\n<li>Other<\/li>\n<\/ul>\n\n\n\n<p>while from those categories an incomplete list of operations is:<\/p><div class=\"gtech-mid-cont\" style=\"text-align: center;\" id=\"gtech-2395794061\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-3019866991\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HexdumpFrom<\/li>\n\n\n\n<li>HexdumpTo<\/li>\n\n\n\n<li>HexFrom<\/li>\n\n\n\n<li>HexTo<\/li>\n\n\n\n<li>CharcodeFrom<\/li>\n\n\n\n<li>CharcodeTo<\/li>\n\n\n\n<li>DecimalFrom<\/li>\n\n\n\n<li>DecimalTo<\/li>\n\n\n\n<li>BinaryFrom<\/li>\n\n\n\n<li>BinaryTo<br><br><\/li>\n\n\n\n<li>EncryptAES<\/li>\n\n\n\n<li>DecryptBlowfish<\/li>\n\n\n\n<li>EncryptBlowfish<\/li>\n\n\n\n<li>DecryptDES<\/li>\n\n\n\n<li>EncryptDES<\/li>\n\n\n\n<li>DecryptTriple<\/li>\n\n\n\n<li>EncryptTriple<\/li>\n\n\n\n<li>DecryptRC2<\/li>\n\n\n\n<li>EncryptRC2<\/li>\n\n\n\n<li>DecryptRC4RC4<br><br><\/li>\n\n\n\n<li>BeautifyJavaScript<\/li>\n\n\n\n<li>ParserJavaScript<\/li>\n\n\n\n<li>BeautifyJavaScript<\/li>\n\n\n\n<li>MinifyJSON<\/li>\n\n\n\n<li>BeautifyJSON<\/li>\n\n\n\n<li>MinifyXML<\/li>\n\n\n\n<li>BeautifyXML<\/li>\n\n\n\n<li>MinifySQL<\/li>\n\n\n\n<li>BeautifySQL<\/li>\n\n\n\n<li>MinifyCSS<br><br><\/li>\n\n\n\n<li>StringsExtract<\/li>\n\n\n\n<li>IPaddressesExtract<\/li>\n\n\n\n<li>emailaddressesExtract<\/li>\n\n\n\n<li>MACaddressesExtract<\/li>\n\n\n\n<li>URLsExtract<\/li>\n\n\n\n<li>domainsExtract<\/li>\n\n\n\n<li>filepathsExtract<\/li>\n\n\n\n<li>expressionXPath<\/li>\n\n\n\n<li>expressionJPath<\/li>\n\n\n\n<li>EXIFExtract<\/li>\n<\/ul>\n\n\n\n<p>On top of that you can run operations on files too (you can load \nfiles up to 2GB) like compressing and decompressing them, calculating \ntheir hashes and checksums.<\/p>\n\n\n\n<p>Until this point you could just consider CyberChef as a beefed up but  yet another data format converter.However, CyberChef takes it one step  further in allowing you to combine operations into pipes where the  output of the previous operation acts as input to the next one. In the  following example I first Base64 encode a string and then AES encrypt  it.<\/p>\n\n\n\n<p>I can save this two-step operation as a Recipe which can be recalled \nat any time. As such, instead of keeping collections of snippets which \nyou manually apply step by step onto your input, you can now automate \nthe process similar to using macros.<\/p>\n\n\n\n<p>CyberChef runs exclusively on the client&#8217;s browser without any server initiated interaction.Therefore even if you use the <a href=\"https:\/\/gchq.github.io\/CyberChef\" target=\"_blank\" rel=\"noreferrer noopener\">live playground version <\/a>hosted on GCHQ&#8217;s Github repo, the secret agents won&#8217;t have access to any of the data you submit (for a change!).<\/p>\n\n\n\n<p class=\"cls has-palette-color-14-color has-palette-color-1-background-color has-text-color has-background has-link-color wp-elements-a5fda1339260712097f459c4d6a8e0bc\">As a matter of fact CyberChef can be downloaded as a single bundle and be carried around on a USB stick or any other media, handy when  there&#8217;s no network connection and that Hex to Octal conversion just cannot wait. Saying that, there&#8217;s also a CyberChef server version  for those preferring to self-host and provide an API for clients to send CyberChef recipes to be baked. All that available under the Apache  2.0 License&nbsp;and also covered by&nbsp;Crown Copyright.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">More Information \u2139<\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/gchq\/CyberChef\" target=\"_blank\">CyberChef on GitHub<\/a><\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/gchq.github.io\/CyberChef\" target=\"_blank\">CyberChef live playground version<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/gchq\/CyberChef-server\" target=\"_blank\" rel=\"noreferrer noopener\">CyberChef server version <\/a> <\/li>\n\n\n\n<li><span class=\"removed_link\" title=\"https:\/\/www.nsa.gov\/resources\/everyone\/ghidra\/\">NSA Ghindra<\/span><\/li>\n\n\n\n<li><a href=\"https:\/\/ghidra-sre.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ghindra<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/NationalSecurityAgency\/ghidra\" target=\"_blank\" rel=\"noreferrer noopener\">Ghindra on GitHub<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cla.co.uk\/crown-copyright\" target=\"_blank\" rel=\"noreferrer noopener\">Crown Copyright<\/a><\/li>\n<\/ul>\n<div class=\"gtech-end-cont\" id=\"gtech-2680855196\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-921066772\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Encoding, encrypting and converting data formats, open source and  collected under one roof inside the browser.<\/p>\n","protected":false},"author":7,"featured_media":6505,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1915],"tags":[1444,1045,230,235,236,289,1044,1046,606,6,1494],"class_list":["post-6504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-cyber-security","tag-cyberchef","tag-data-handling","tag-data-science","tag-data-security","tag-encryption","tag-gchq","tag-ghindra","tag-nsa","tag-programming","tag-web-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=6504"}],"version-history":[{"count":0,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6504\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/6505"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=6504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=6504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=6504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}