当前位置:网站首页>Attack and defense world crypto WP
Attack and defense world crypto WP
2022-07-05 13:43:00 【Sex sex ~ ~】
One 、 Catalog
1.base64
2.caesar
3.Morse
4. Idempotent encryption
5.Railfence
6. Mixed encoding
Two 、 Their thinking
1.base64
Open the file attachment

The prompt given in the title is base64 encryption , Decrypt online

obtain flag: cyberpeace{Welcome_to_new_World!}
2.caesar
Open the file attachment

The title says yes caesar encryption , Decrypt online ,key The value of the 0~25 One by one, try to be on duty 14 When you get rid of flag

3.Morse
Open the file attachment

The title has told us that it is moss encryption , Then observe that the attachments are made of 1 and 0 form , Just like the one in moss code - and . Take care of each other
Edit the file as -- --- .-. ... . -.-. In the form of

Then decrypt

flag:cyberpeace{morsecodeissointeresting}
4. Idempotent encryption
Open the file attachment

The encryption method mentioned in the title is idempotent encryption , But we observe the attachment , Normal idempotent encryption only starts from 0~5, There will be no 8,
I learned through Baidu that this is the cloud shadow password , Let's first learn about cloud shadow encryption .
Cloud shadow encryption : Cloud shadow encryption , also called 01248 password … Unlike binary power encryption , This encryption method uses 0 Make interval , Other than 0 Numbers are separated and combined to represent serial numbers 1~26 One of the letters (a/A,b/B,c/C…z/Z).

View Title Requirements flag For the eight capital letters solved , According to the nature of cloud shadow encryption , With 0 Separate this string of arrays as an interval, which is exactly eight groups , Add the numbers in each array , Then the total number corresponds to A~Z Letters in .

flag:cyberpeace{WELLDONE}
5.Railfence

According to the title, it is fence encryption , There are two kinds of fence encryption , There is another way W Type fence encryption , Decrypt the attachment first , The title says 5 A chicken , therefore key May be 5


And the result seems to be incorrect flag, Then the characters are W Type fence decryption

flag:cyberpeace{railfence_cipher_gogogo}
6. Mixed encoding
Open the file attachment

There are two equal signs at the end of the file , It can be seen that base64 encryption , To decrypt

Baidu knows that the character revealed is an encryption method , by Unicode code , Turn it into ascll code

Observation characters have English case and numbers , May be base64 encryption , To decrypt

Observe the decrypted characters , Between numbers / Separated and these numbers do not exceed 126, It may correspond to ascll clock , Put these numbers one A contrast ascll clock

flag:cyberpeace{welcometoattackanddefenceworld}
边栏推荐
- Integer = = the comparison will unpack automatically. This variable cannot be assigned empty
- 4年工作经验,多线程间的5种通信方式都说不出来,你敢信?
- ::ffff:192.168.31.101 是一个什么地址?
- MMSeg——Mutli-view时序数据检查与可视化
- asp.net 读取txt文件
- 53. 最大子数组和:给你一个整数数组 nums ,请你找出一个具有最大和的连续子数组(子数组最少包含一个元素),返回其最大和。
- Write API documents first or code first?
- Laravel framework operation error: no application encryption key has been specified
- Could not set property ‘id‘ of ‘class XX‘ with value ‘XX‘ argument type mismatch 解决办法
- Parsing XML using Dom4j
猜你喜欢

Scientific running robot pancakeswap clip robot latest detailed tutorial

RK3566添加LED

MySQL --- 数据库查询 - 排序查询、分页查询

嵌入式软件架构设计-消息交互

Solve the problem of invalid uni app configuration page and tabbar

Mmseg - Mutli view time series data inspection and visualization

TortoiseSVN使用情形、安装与使用

基于微信小程序的订餐系统

私有地址有那些

Shandong University Summer Training - 20220620
随机推荐
Aikesheng sqle audit tool successfully completed the evaluation of "SQL quality management platform grading ability" of the Academy of communications and communications
华为推送服务内容,阅读笔记
什么叫做信息安全?包含哪些内容?与网络安全有什么区别?
leetcode 10. Regular expression matching regular expression matching (difficult)
49. Grouping of alphabetic ectopic words: give you a string array, please combine the alphabetic ectopic words together. You can return a list of results in any order. An alphabetic ectopic word is a
Wechat app payment callback processing method PHP logging method, notes. 2020/5/26
Jasypt configuration file encryption | quick start | actual combat
法国学者:最优传输理论下对抗攻击可解释性探讨
Basic characteristics and isolation level of transactions
C object storage
The real king of caching, Google guava is just a brother
What happened to the communication industry in the first half of this year?
Could not set property ‘id‘ of ‘class XX‘ with value ‘XX‘ argument type mismatch 解决办法
How to apply the updated fluent 3.0 to applet development
[深度学习论文笔记]使用多模态MR成像分割脑肿瘤的HNF-Netv2
JS to determine whether an element exists in the array (four methods)
STM32 reverse entry
ELFK部署
Pancake Bulldog robot V2 (code optimized)
RK3566添加LED