当前位置:网站首页>Attack and defense world crypto WP
Attack and defense world crypto WP
2022-07-05 13:43:00 【Sex sex ~ ~】
One 、 Catalog
1.base64
2.caesar
3.Morse
4. Idempotent encryption
5.Railfence
6. Mixed encoding
Two 、 Their thinking
1.base64
Open the file attachment
The prompt given in the title is base64 encryption , Decrypt online
obtain flag: cyberpeace{Welcome_to_new_World!}
2.caesar
Open the file attachment
The title says yes caesar encryption , Decrypt online ,key The value of the 0~25 One by one, try to be on duty 14 When you get rid of flag
3.Morse
Open the file attachment
The title has told us that it is moss encryption , Then observe that the attachments are made of 1 and 0 form , Just like the one in moss code - and . Take care of each other
Edit the file as -- --- .-. ... . -.-. In the form of
Then decrypt
flag:cyberpeace{morsecodeissointeresting}
4. Idempotent encryption
Open the file attachment
The encryption method mentioned in the title is idempotent encryption , But we observe the attachment , Normal idempotent encryption only starts from 0~5, There will be no 8,
I learned through Baidu that this is the cloud shadow password , Let's first learn about cloud shadow encryption .
Cloud shadow encryption : Cloud shadow encryption , also called 01248 password … Unlike binary power encryption , This encryption method uses 0 Make interval , Other than 0 Numbers are separated and combined to represent serial numbers 1~26 One of the letters (a/A,b/B,c/C…z/Z).
View Title Requirements flag For the eight capital letters solved , According to the nature of cloud shadow encryption , With 0 Separate this string of arrays as an interval, which is exactly eight groups , Add the numbers in each array , Then the total number corresponds to A~Z Letters in .
flag:cyberpeace{WELLDONE}
5.Railfence
According to the title, it is fence encryption , There are two kinds of fence encryption , There is another way W Type fence encryption , Decrypt the attachment first , The title says 5 A chicken , therefore key May be 5
And the result seems to be incorrect flag, Then the characters are W Type fence decryption
flag:cyberpeace{railfence_cipher_gogogo}
6. Mixed encoding
Open the file attachment
There are two equal signs at the end of the file , It can be seen that base64 encryption , To decrypt
Baidu knows that the character revealed is an encryption method , by Unicode code , Turn it into ascll code
Observation characters have English case and numbers , May be base64 encryption , To decrypt
Observe the decrypted characters , Between numbers / Separated and these numbers do not exceed 126, It may correspond to ascll clock , Put these numbers one A contrast ascll clock
flag:cyberpeace{welcometoattackanddefenceworld}
边栏推荐
- Huawei push service content, read notes
- Go array and slice
- 个人组件 - 消息提示
- 内网穿透工具 netapp
- 如何把大的‘tar‘存档文件分割成特定大小的多个文件
- Operational research 68 | the latest impact factors in 2022 were officially released. Changes in journals in the field of rapid care
- leetcode 10. Regular Expression Matching 正则表达式匹配 (困难)
- [daily question] 1200 Minimum absolute difference
- Address book (linked list implementation)
- Summary and arrangement of JPA specifications
猜你喜欢
Data Lake (VII): Iceberg concept and review what is a data Lake
The real king of caching, Google guava is just a brother
Redis6 master-slave replication and clustering
Aikesheng sqle audit tool successfully completed the evaluation of "SQL quality management platform grading ability" of the Academy of communications and communications
记录一下在深度学习-一些bug处理
运筹说 第68期|2022年最新影响因子正式发布 快看管科领域期刊的变化
redis6主从复制及集群
Wonderful express | Tencent cloud database June issue
Backup and restore of Android local SQLite database
Mmseg - Mutli view time series data inspection and visualization
随机推荐
jenkins安装
Talk about seven ways to realize asynchronous programming
Redis6 data type and operation summary
【 script secret pour l'utilisation de MySQL 】 un jeu en ligne sur l'heure et le type de date de MySQL et les fonctions d'exploitation connexes (3)
ZABBIX monitoring
法国学者:最优传输理论下对抗攻击可解释性探讨
ETCD数据库源码分析——集群间网络层客户端peerRt
aspx 简单的用户登录
C object storage
What happened to the communication industry in the first half of this year?
Summary and arrangement of JPA specifications
49. Grouping of alphabetic ectopic words: give you a string array, please combine the alphabetic ectopic words together. You can return a list of results in any order. An alphabetic ectopic word is a
"Baidu Cup" CTF competition in September, web:upload
什么叫做信息安全?包含哪些内容?与网络安全有什么区别?
Clock cycle
go map
面试官灵魂拷问:为什么代码规范要求 SQL 语句不要过多的 join?
嵌入式软件架构设计-消息交互
The development of speech recognition app with uni app is simple and fast.
今年上半年,通信行业发生了哪些事?