当前位置:网站首页>Attack and defense world crypto WP
Attack and defense world crypto WP
2022-07-05 13:43:00 【Sex sex ~ ~】
One 、 Catalog
1.base64
2.caesar
3.Morse
4. Idempotent encryption
5.Railfence
6. Mixed encoding
Two 、 Their thinking
1.base64
Open the file attachment
The prompt given in the title is base64 encryption , Decrypt online
obtain flag: cyberpeace{Welcome_to_new_World!}
2.caesar
Open the file attachment
The title says yes caesar encryption , Decrypt online ,key The value of the 0~25 One by one, try to be on duty 14 When you get rid of flag
3.Morse
Open the file attachment
The title has told us that it is moss encryption , Then observe that the attachments are made of 1 and 0 form , Just like the one in moss code - and . Take care of each other
Edit the file as -- --- .-. ... . -.-. In the form of
Then decrypt
flag:cyberpeace{morsecodeissointeresting}
4. Idempotent encryption
Open the file attachment
The encryption method mentioned in the title is idempotent encryption , But we observe the attachment , Normal idempotent encryption only starts from 0~5, There will be no 8,
I learned through Baidu that this is the cloud shadow password , Let's first learn about cloud shadow encryption .
Cloud shadow encryption : Cloud shadow encryption , also called 01248 password … Unlike binary power encryption , This encryption method uses 0 Make interval , Other than 0 Numbers are separated and combined to represent serial numbers 1~26 One of the letters (a/A,b/B,c/C…z/Z).
View Title Requirements flag For the eight capital letters solved , According to the nature of cloud shadow encryption , With 0 Separate this string of arrays as an interval, which is exactly eight groups , Add the numbers in each array , Then the total number corresponds to A~Z Letters in .
flag:cyberpeace{WELLDONE}
5.Railfence
According to the title, it is fence encryption , There are two kinds of fence encryption , There is another way W Type fence encryption , Decrypt the attachment first , The title says 5 A chicken , therefore key May be 5
And the result seems to be incorrect flag, Then the characters are W Type fence decryption
flag:cyberpeace{railfence_cipher_gogogo}
6. Mixed encoding
Open the file attachment
There are two equal signs at the end of the file , It can be seen that base64 encryption , To decrypt
Baidu knows that the character revealed is an encryption method , by Unicode code , Turn it into ascll code
Observation characters have English case and numbers , May be base64 encryption , To decrypt
Observe the decrypted characters , Between numbers / Separated and these numbers do not exceed 126, It may correspond to ascll clock , Put these numbers one A contrast ascll clock
flag:cyberpeace{welcometoattackanddefenceworld}
边栏推荐
- 【云资源】云资源安全管理用什么软件好?为什么?
- 53. Maximum subarray sum: give you an integer array num, please find a continuous subarray with the maximum sum (the subarray contains at least one element) and return its maximum sum.
- Godson 2nd generation burn PMON and reload system
- Datapipeline was selected into the 2022 digital intelligence atlas and database development report of China Academy of communications and communications
- JS to determine whether an element exists in the array (four methods)
- [server data recovery] a case of RAID5 data recovery stored in a brand of server
- 法国学者:最优传输理论下对抗攻击可解释性探讨
- 华为推送服务内容,阅读笔记
- Binder communication process and servicemanager creation process
- 4年工作经验,多线程间的5种通信方式都说不出来,你敢信?
猜你喜欢
百度杯”CTF比赛 2017 二月场,Web:爆破-2
About the problem and solution of 403 error in wampserver
"Baidu Cup" CTF competition in September, web:sql
“百度杯”CTF比赛 九月场,Web:Upload
ZABBIX monitoring
Summit review | baowanda - an integrated data security protection system driven by compliance and security
Don't know these four caching modes, dare you say you understand caching?
Can and can FD
Scientific running robot pancakeswap clip robot latest detailed tutorial
MMSeg——Mutli-view时序数据检查与可视化
随机推荐
一网打尽异步神器CompletableFuture
Go string operation
Don't know these four caching modes, dare you say you understand caching?
Scientific running robot pancakeswap clip robot latest detailed tutorial
redis6事务和锁机制
asp. Net read TXT file
那些考研后才知道的事
Network security HSRP protocol
redis6数据类型及操作总结
The development of speech recognition app with uni app is simple and fast.
With 4 years of working experience, you can't tell five ways of communication between multithreads. Dare you believe it?
FPGA learning notes: vivado 2019.1 add IP MicroBlaze
[deep learning paper notes] hnf-netv2 for segmentation of brain tumors using multimodal MR imaging
研究生可以不用学英语?只要考研英语或六级分数高!
Shuttle INKWELL & ink components
RK3566添加LED
私有地址有那些
Binder communication process and servicemanager creation process
kafaka 日志收集
leetcode 10. Regular expression matching regular expression matching (difficult)