当前位置:网站首页>Buuctf misc grab from the doll
Buuctf misc grab from the doll
2022-06-24 07:24:00 【[mzq]】
From the doll
Title address : https://buuoj.cn/challenges#%E4%BB%8E%E5%A8%83%E5%A8%83%E6%8A%93%E8%B5%B7
After decompression, you get two txt file , Title Description .txt It should be a hint 
The Chinese code corresponding to the first sentence code
0086 1562 2535 5174
Chinese code : https://dianma.bmcx.com/
bnhn s wwy vffg vffg rrhy fhnv

then md5 use flag{} Just wrap it up 
边栏推荐
- Precipitation of architecture design methodology
- Implementation and usage analysis of static pod
- 【TS】函数类型
- [OGeek2019]babyrop
- The latest crawler tutorial in 2021: video demonstration of web crawling
- MFC使用控制台时 项目路径中不能有空格和中文,否则会报错误 LNK1342 未能保存要编辑的二进制文件的备份副本等
- Tencent host security captures Yapi remote code execution 0day vulnerability for wild exploitation. The attack is spreading and can be intercepted by firewall
- Bay area enterprises quick look! The focus of the data regulations of Shenzhen Special Economic Zone just released is coming!
- 关于取模数据序号定位的说明 区码定位是指GBK编码
- (CVE-2020-11978)Airflow dag中的命令注入漏洞复现【vulhub靶场】
猜你喜欢

现货黄金有哪些眩人的小技术?

【均衡器】LS均衡器,DEF均衡器以及LMMSE均衡器的误码率性能对比仿真

与(&&)逻辑或(||),动态绑定结合三目运算

get_started_3dsctf_2016

Unexpected token u in JSON at position 0
![[image fusion] image fusion based on NSST and PCNN with matlab code](/img/b4/61a5adde0d0bfc5a339ef8ab948d43.png)
[image fusion] image fusion based on NSST and PCNN with matlab code
╯︵ ┻━┻](/img/26/6986a8ae6c00eb2431a082dc0ff978.png)
[DDCTF2018](╯°□°)╯︵ ┻━┻

大厂不是衡量能力的唯一出路,上财学姐毕业三年的经验分享

20个不容错过的ES6技巧

Leetcode probability interview shock series 11~15
随机推荐
【WordPress建站】5. 设置代码高亮
两个链表的第一个公共节点_链表中环的入口(剑指offer)
Tutorial on simple use of Modbus to BACnet gateway
A case study of apiserver avalanche caused by serviceaccount
Kaseya of the United States was attacked by hackers, and 1500 downstream enterprises were damaged. How can small and medium-sized enterprises prevent extortion virus?
Face pincher: a hot meta universe stylist
基因检测,如何帮助患者对抗疾病?
6000多万铲屎官,捧得出一个国产主粮的春天吗?
Win11笔记本省电模式怎么开启?Win11电脑节电模式打开方法
What is an intrusion detection system?
0 foundation a literature club low code development member management applet (4)
电脑如何打开软键盘,教大家Win10如何打开软键盘的方法
20 not to be missed ES6 tips
内网学习笔记(4)
In JS, the regular expression verifies the hour and minute, and converts the input string to the corresponding hour and minute
[security] how to [host security - hybrid cloud version] support secure access to non Tencent virtual machines
Tencent host security captures Yapi remote code execution 0day vulnerability for wild exploitation. The attack is spreading and can be intercepted by firewall
EasyDSS_ The dash version solves the problem that the RTSP source address cannot play the video stream
【MySQL 使用秘籍】克隆数据表、保存查询数据至数据表以及创建临时表
[GUET-CTF2019]zips