当前位置:网站首页>Jarvis OJ shell traffic analysis
Jarvis OJ shell traffic analysis
2022-07-05 16:46:00 【[mzq]】
shell Flow analysis
Title Attachment : https://dn.jarvisoj.com/challengefiles/+_+.rar.977e2c637dc492fb9a7cf7595c852044
Use strings Find keywords ctf I found one of them python Encryption and decryption script

use wireshark analysis tcp There are encrypted and decrypted in the stream python2 Script

Also found a string base64 Encrypted string , Try to decrypt and get garbled code

Guess after decryption python Script decryption

from Crypto import Random
from Crypto.Cipher import AES
import sys
import base64
def decrypt(encrypted, passphrase):
IV = encrypted[:16]
aes = AES.new(passphrase, AES.MODE_CBC, IV)
return aes.decrypt(encrypted[16:])
def encrypt(message, passphrase):
IV = message[:16]
length = 16
count = len(message)
padding = length - (count % length)
message = message + '\0' * padding
aes = AES.new(passphrase, AES.MODE_CBC, IV)
return aes.encrypt(message)
IV = 'YUFHJKVWEASDGQDH'
message = IV + 'flag is hctf{xxxxxxxxxxxxxxx}'
#print len(message)
#example = encrypt(message, 'Qq4wdrhhyEWe4qBF')
#print example
example = "mbZoEMrhAO0WWeugNjqNw3U6Tt2C+rwpgpbdWRZgfQI3MAh0sZ9qjnziUKkV90XhAOkIs/OXoYVw5uQDjVvgNA=="
example = base64.b64decode(example)
example = decrypt(example, 'Qq4wdrhhyEWe4qBF')
print example
flag is hctf{
n0w_U_w111_n0t_f1nd_me}
边栏推荐
- Quelques réflexions cognitives
- Explain in detail the functions and underlying implementation logic of the groups sets statement in SQL
- tf. sequence_ Mask function explanation case
- Dare not buy thinking
- OneForAll安装使用
- 不敢买的思考
- 数据访问 - EntityFramework集成
- Android privacy sandbox developer preview 3: privacy, security and personalized experience
- Yarn common commands
- Detailed explanation of use scenarios and functions of polar coordinate sector diagram
猜你喜欢

Research and development efficiency measurement index composition and efficiency measurement methodology

Single merchant v4.4 has the same original intention and strength!

File operation --i/o

Win11提示无法安全下载软件怎么办?Win11无法安全下载软件

【刷題篇】鹅廠文化衫問題

Bs-xx-042 implementation of personnel management system based on SSM

为季前卡牌游戏 MotoGP Ignition Champions 做好准备!

单商户 V4.4,初心未变,实力依旧!
![[brush title] goose factory shirt problem](/img/c8/44496c767a778101cf3982bd911933.png)
[brush title] goose factory shirt problem

DeSci:去中心化科学是Web3.0的新趋势?
随机推荐
清晰还原31年前现场,火山引擎超清修复Beyond经典演唱会
How can programmers improve their situation?
Cartoon: what is distributed transaction?
[vulnerability warning] cve-2022-26134 conflict Remote Code Execution Vulnerability POC verification and repair process
[deep learning] [original] let yolov6-0.1.0 support the txt reading dataset mode of yolov5
Jarvis OJ 远程登录协议
Explain in detail the functions and underlying implementation logic of the groups sets statement in SQL
Binary tree related OJ problems
Pspnet | semantic segmentation and scene analysis
【刷題篇】鹅廠文化衫問題
【漏洞预警】CVE-2022-26134 Confluence 远程代码执行漏洞POC验证与修复过程
公司自用的国产API管理神器
二叉树相关OJ题
Bs-xx-042 implementation of personnel management system based on SSM
如何安装mysql
Today's sleep quality record 79 points
Apiccloud cloud debugging solution
Cheer yourself up
给自己打打气
今日睡眠质量记录79分