当前位置:网站首页>Attack and defense world crypto WP
Attack and defense world crypto WP
2022-07-05 13:43:00 【Sex sex ~ ~】
One 、 Catalog
1.base64
2.caesar
3.Morse
4. Idempotent encryption
5.Railfence
6. Mixed encoding
Two 、 Their thinking
1.base64
Open the file attachment
The prompt given in the title is base64 encryption , Decrypt online
obtain flag: cyberpeace{Welcome_to_new_World!}
2.caesar
Open the file attachment
The title says yes caesar encryption , Decrypt online ,key The value of the 0~25 One by one, try to be on duty 14 When you get rid of flag
3.Morse
Open the file attachment
The title has told us that it is moss encryption , Then observe that the attachments are made of 1 and 0 form , Just like the one in moss code - and . Take care of each other
Edit the file as -- --- .-. ... . -.-. In the form of
Then decrypt
flag:cyberpeace{morsecodeissointeresting}
4. Idempotent encryption
Open the file attachment
The encryption method mentioned in the title is idempotent encryption , But we observe the attachment , Normal idempotent encryption only starts from 0~5, There will be no 8,
I learned through Baidu that this is the cloud shadow password , Let's first learn about cloud shadow encryption .
Cloud shadow encryption : Cloud shadow encryption , also called 01248 password … Unlike binary power encryption , This encryption method uses 0 Make interval , Other than 0 Numbers are separated and combined to represent serial numbers 1~26 One of the letters (a/A,b/B,c/C…z/Z).
View Title Requirements flag For the eight capital letters solved , According to the nature of cloud shadow encryption , With 0 Separate this string of arrays as an interval, which is exactly eight groups , Add the numbers in each array , Then the total number corresponds to A~Z Letters in .
flag:cyberpeace{WELLDONE}
5.Railfence
According to the title, it is fence encryption , There are two kinds of fence encryption , There is another way W Type fence encryption , Decrypt the attachment first , The title says 5 A chicken , therefore key May be 5
And the result seems to be incorrect flag, Then the characters are W Type fence decryption
flag:cyberpeace{railfence_cipher_gogogo}
6. Mixed encoding
Open the file attachment
There are two equal signs at the end of the file , It can be seen that base64 encryption , To decrypt
Baidu knows that the character revealed is an encryption method , by Unicode code , Turn it into ascll code
Observation characters have English case and numbers , May be base64 encryption , To decrypt
Observe the decrypted characters , Between numbers / Separated and these numbers do not exceed 126, It may correspond to ascll clock , Put these numbers one A contrast ascll clock
flag:cyberpeace{welcometoattackanddefenceworld}
边栏推荐
- Write API documents first or code first?
- Primary code audit [no dolls (modification)] assessment
- 什么叫做信息安全?包含哪些内容?与网络安全有什么区别?
- [深度学习论文笔记]UCTransNet:从transformer的通道角度重新思考U-Net中的跳跃连接
- 运筹说 第68期|2022年最新影响因子正式发布 快看管科领域期刊的变化
- 53. Maximum subarray sum: give you an integer array num, please find a continuous subarray with the maximum sum (the subarray contains at least one element) and return its maximum sum.
- ETCD数据库源码分析——集群间网络层客户端peerRt
- Solution to the prompt of could not close zip file during phpword use
- [MySQL usage Script] catch all MySQL time and date types and related operation functions (3)
- Wechat app payment callback processing method PHP logging method, notes. 2020/5/26
猜你喜欢
Laravel framework operation error: no application encryption key has been specified
Laravel框架运行报错:No application encryption key has been specified
[notes of in-depth study paper]transbtsv2: wider instead of deep transformer for medical image segmentation
A detailed explanation of ASCII code, Unicode and UTF-8
这18个网站能让你的页面背景炫酷起来
Nantong online communication group
What happened to the communication industry in the first half of this year?
MySQL --- 数据库查询 - 排序查询、分页查询
Mmseg - Mutli view time series data inspection and visualization
Can and can FD
随机推荐
The "Baidu Cup" CTF competition was held in February 2017, Web: explosion-2
Integer = = the comparison will unpack automatically. This variable cannot be assigned empty
[notes of in-depth study paper]uctransnet: rethink the jumping connection in u-net from the perspective of transformer channel
Jetpack Compose入门到精通
【云资源】云资源安全管理用什么软件好?为什么?
不知道这4种缓存模式,敢说懂缓存吗?
asp.net 读取txt文件
redis6事务和锁机制
[深度学习论文笔记]使用多模态MR成像分割脑肿瘤的HNF-Netv2
今年上半年,通信行业发生了哪些事?
TortoiseSVN使用情形、安装与使用
[public class preview]: basis and practice of video quality evaluation
Basic characteristics and isolation level of transactions
About the problem and solution of 403 error in wampserver
FPGA learning notes: vivado 2019.1 add IP MicroBlaze
网络安全-HSRP协议
Interviewer soul torture: why does the code specification require SQL statements not to have too many joins?
Shandong University Summer Training - 20220620
Talk about seven ways to realize asynchronous programming
When using Tencent cloud for the first time, you can only use webshell connection instead of SSH connection.