当前位置:网站首页>Attack and defense world crypto WP
Attack and defense world crypto WP
2022-07-05 13:43:00 【Sex sex ~ ~】
One 、 Catalog
1.base64
2.caesar
3.Morse
4. Idempotent encryption
5.Railfence
6. Mixed encoding
Two 、 Their thinking
1.base64
Open the file attachment

The prompt given in the title is base64 encryption , Decrypt online

obtain flag: cyberpeace{Welcome_to_new_World!}
2.caesar
Open the file attachment

The title says yes caesar encryption , Decrypt online ,key The value of the 0~25 One by one, try to be on duty 14 When you get rid of flag

3.Morse
Open the file attachment

The title has told us that it is moss encryption , Then observe that the attachments are made of 1 and 0 form , Just like the one in moss code - and . Take care of each other
Edit the file as -- --- .-. ... . -.-. In the form of

Then decrypt

flag:cyberpeace{morsecodeissointeresting}
4. Idempotent encryption
Open the file attachment

The encryption method mentioned in the title is idempotent encryption , But we observe the attachment , Normal idempotent encryption only starts from 0~5, There will be no 8,
I learned through Baidu that this is the cloud shadow password , Let's first learn about cloud shadow encryption .
Cloud shadow encryption : Cloud shadow encryption , also called 01248 password … Unlike binary power encryption , This encryption method uses 0 Make interval , Other than 0 Numbers are separated and combined to represent serial numbers 1~26 One of the letters (a/A,b/B,c/C…z/Z).

View Title Requirements flag For the eight capital letters solved , According to the nature of cloud shadow encryption , With 0 Separate this string of arrays as an interval, which is exactly eight groups , Add the numbers in each array , Then the total number corresponds to A~Z Letters in .

flag:cyberpeace{WELLDONE}
5.Railfence

According to the title, it is fence encryption , There are two kinds of fence encryption , There is another way W Type fence encryption , Decrypt the attachment first , The title says 5 A chicken , therefore key May be 5


And the result seems to be incorrect flag, Then the characters are W Type fence decryption

flag:cyberpeace{railfence_cipher_gogogo}
6. Mixed encoding
Open the file attachment

There are two equal signs at the end of the file , It can be seen that base64 encryption , To decrypt

Baidu knows that the character revealed is an encryption method , by Unicode code , Turn it into ascll code

Observation characters have English case and numbers , May be base64 encryption , To decrypt

Observe the decrypted characters , Between numbers / Separated and these numbers do not exceed 126, It may correspond to ascll clock , Put these numbers one A contrast ascll clock

flag:cyberpeace{welcometoattackanddefenceworld}
边栏推荐
- [deep learning paper notes] hnf-netv2 for segmentation of brain tumors using multimodal MR imaging
- 内网穿透工具 netapp
- Catch all asynchronous artifact completable future
- When there are too many input boxes such as input transmitted at one time in the form, the post data is intercepted
- 真正的缓存之王,Google Guava 只是弟弟
- 53. 最大子数组和:给你一个整数数组 nums ,请你找出一个具有最大和的连续子数组(子数组最少包含一个元素),返回其最大和。
- 网络安全-HSRP协议
- 这18个网站能让你的页面背景炫酷起来
- 49. 字母异位词分组:给你一个字符串数组,请你将 字母异位词 组合在一起。可以按任意顺序返回结果列表。 字母异位词 是由重新排列源单词的字母得到的一个新单词,所有源单词中的字母通常恰好只用一次。
- 百度杯”CTF比赛 2017 二月场,Web:爆破-2
猜你喜欢

Catch all asynchronous artifact completable future

面试官灵魂拷问:为什么代码规范要求 SQL 语句不要过多的 join?

Cloudcompare - point cloud slice

These 18 websites can make your page background cool

Redis6 master-slave replication and clustering
![[deep learning paper notes] hnf-netv2 for segmentation of brain tumors using multimodal MR imaging](/img/52/5e85743b1817de96a52e02b92fd08c.png)
[deep learning paper notes] hnf-netv2 for segmentation of brain tumors using multimodal MR imaging
![[notes of in-depth study paper]uctransnet: rethink the jumping connection in u-net from the perspective of transformer channel](/img/b6/f9da8a36167db10c9a92dabb166c81.png)
[notes of in-depth study paper]uctransnet: rethink the jumping connection in u-net from the perspective of transformer channel

Could not set property 'ID' of 'class xx' with value 'XX' argument type mismatch solution

法国学者:最优传输理论下对抗攻击可解释性探讨

Laravel framework operation error: no application encryption key has been specified
随机推荐
Jenkins installation
Summit review | baowanda - an integrated data security protection system driven by compliance and security
Redis6 transaction and locking mechanism
49. Grouping of alphabetic ectopic words: give you a string array, please combine the alphabetic ectopic words together. You can return a list of results in any order. An alphabetic ectopic word is a
MMSeg——Mutli-view时序数据检查与可视化
asp. Net read TXT file
多人合作项目查看每个人写了多少行代码
Win10 - lightweight gadget
Shuttle INKWELL & ink components
Could not set property 'ID' of 'class xx' with value 'XX' argument type mismatch solution
The "Baidu Cup" CTF competition was held in February 2017, Web: explosion-2
These 18 websites can make your page background cool
Personal component - message prompt
【MySQL 使用秘籍】一網打盡 MySQL 時間和日期類型與相關操作函數(三)
Binder communication process and servicemanager creation process
redis6数据类型及操作总结
MATLAB论文图表标准格式输出(干货)
PostgreSQL Usage Summary (PIT)
redis6主从复制及集群
asp.net 读取txt文件