当前位置:网站首页>Network security - Novice introduction
Network security - Novice introduction
2022-07-05 13:43:00 【Sex sex ~ ~】
MISC
1、 Simple steganography
2、 Looking for your sister
CRYPTO
1、 Four Caesars or four fences
2、 Beautiful notes
3、 Little rabbit
WEB
1、 Sign in
2、EZphp
1、 Simple steganography
Open the topic prompt , Follow the instructions , Search for CTF Steganography routine Search for
Check the picture information according to our search results and find that there is no relevant flag Information about . Open according to the second method 010Editor.exe Software Ctrl+F Search for
The result appears .
SLsec{e2e0061f251355de79777499528d6d75}
2、 Looking for your sister
Download the file on the topic , Because the file is zip Format , So rename the file and open the compressed package
After opening the compressed package, there are two files
After the first one opens
good heavens , This is the declassification of the type of socialist core values .
After decryption, he told me this flag It's not true , So I opened the second compressed package ,
When looking at the properties, I didn't find What useful information , Drag it into 010Editor.exe Search for flag
flag{you_are_lucky_d0g}
CRYPTO
1、 Four Caesars or four fences
According to the title prompt, first decrypt the characters by Caesar , The title says four , Then the number may be 4
Then the decrypted characters will be decrypted , The number is still chosen 4,
flag:slsec{55fb656d28c55e09ecc45424f952370f}
2、 Beautiful notes
Open file
Because they are all decryption type topics , Search for notes and decrypt , Decrypt the characters in the file to get a string of characters
Characters consist of the case of letters and numbers base64 The encryption type of , And then decrypt it
SLsec{D0FA06CD93335C8CAE357FFE5CD1C4E9}
3、 Little rabbit
The title says little rabbit , So we went to search rabbit Decrypt Open file
Decryption requires a key. Today is a good day , Fill in the date of the day when you do the question , Decrypt .
SLsec{f330ad0d5bba3bab338d99a7b2ba81ca}
WEB
1、 Sign in
Click the title link
F12 Key to view the source code
SLsec{We1c0me__T0_SLsec_Recru1t new [email protected]}
2、EZphp
Open the title link
Look at the code , first if It means if a If it is a number, it stops running , the second if Means to a=8848, stay php In the weak type of ,php Will compare the number before the character with the number after the character , So you should not only input a=8848 Also enter one or more characters after
SLsec{[email protected]@ge}
边栏推荐
- 那些考研后才知道的事
- French scholars: the explicability of counter attack under optimal transmission theory
- aspx 简单的用户登录
- 49. Grouping of alphabetic ectopic words: give you a string array, please combine the alphabetic ectopic words together. You can return a list of results in any order. An alphabetic ectopic word is a
- 如何把大的‘tar‘存档文件分割成特定大小的多个文件
- leetcode 10. Regular Expression Matching 正则表达式匹配 (困难)
- Record in-depth learning - some bug handling
- MMSeg——Mutli-view时序数据检查与可视化
- 49. 字母异位词分组:给你一个字符串数组,请你将 字母异位词 组合在一起。可以按任意顺序返回结果列表。 字母异位词 是由重新排列源单词的字母得到的一个新单词,所有源单词中的字母通常恰好只用一次。
- Usage, installation and use of TortoiseSVN
猜你喜欢
About the problem and solution of 403 error in wampserver
Idea remote debugging agent
Aikesheng sqle audit tool successfully completed the evaluation of "SQL quality management platform grading ability" of the Academy of communications and communications
百度杯”CTF比赛 2017 二月场,Web:爆破-2
When using Tencent cloud for the first time, you can only use webshell connection instead of SSH connection.
MMSeg——Mutli-view时序数据检查与可视化
A detailed explanation of ASCII code, Unicode and UTF-8
ZABBIX monitoring
“百度杯”CTF比赛 九月场,Web:Upload
[notes of in-depth study paper]transbtsv2: wider instead of deep transformer for medical image segmentation
随机推荐
The development of speech recognition app with uni app is simple and fast.
RK3566添加LED
Laravel framework operation error: no application encryption key has been specified
Zhubo Huangyu: it's really bad not to understand these gold frying skills
go map
NFT value and white paper acquisition
A detailed explanation of ASCII code, Unicode and UTF-8
[server data recovery] a case of RAID5 data recovery stored in a brand of server
leetcode 10. Regular Expression Matching 正则表达式匹配 (困难)
Data Lake (VII): Iceberg concept and review what is a data Lake
【云资源】云资源安全管理用什么软件好?为什么?
Summit review | baowanda - an integrated data security protection system driven by compliance and security
Integer = = the comparison will unpack automatically. This variable cannot be assigned empty
多人合作项目查看每个人写了多少行代码
redis6事务和锁机制
49. Grouping of alphabetic ectopic words: give you a string array, please combine the alphabetic ectopic words together. You can return a list of results in any order. An alphabetic ectopic word is a
不知道这4种缓存模式,敢说懂缓存吗?
When there are too many input boxes such as input transmitted at one time in the form, the post data is intercepted
个人组件 - 消息提示
Kotlin协程利用CoroutineContext实现网络请求失败后重试逻辑