Bugku旧平台crypto writeup
滴答~滴
摩尔斯电码加密
KEY{BKCTFMISC}
聪明的小羊
栅栏密码 2栏
KEY{sad23jjdsa2}
Ok
http://127.0.0.1/ook-master/
ook加密
flag{ok-ctf-1234-admin}
这不是摩斯密码
http://127.0.0.1/ook-master/
brainfuck加密
flag{ok-c2tf-3389-admin}
easy_crypto
摩尔斯加密0代表.1代表-
flag{m0rse_code_1s_interest1n9!}
简单加密
e6Z9i~]8R~U~QHE{RnY{QXg~QnQ{^XVlRXlp^XI5Q6Q6SKY8jUAA
解:看到这一串字符,后面有AA猜测是凯撒密码(注意:这里的凯撒加密为变形凯撒加密,包含符号)和base64的混合加密。首先参照ASCII表,A的ASCII是65,=的ASCII是61,偏移了四位,所以写一个python脚本将所有的字符都偏移四位
脚本如下:
# -*- coding:utf8 -*-
from __future__ import print_function
def caesar(text):
for i in range(len(text)):
print("{}".format(chr(ord(text[i])-4)), end='')
caesar('e6Z9i~]8R~U~QHE{RnY{QXg~QnQ{^XVlRXlp^XI5Q6Q6SKY8jUAA')
得到的base64字符串:
a2V5ezY4NzQzMDAwNjUwMTczMjMwZTRhNThlZTE1M2M2OGU4fQ==
进行base64解密 :
key{68743000650173230e4a58ee153c68e8}
散乱的密文
置换密码,用密码机器解密
flag{52048c453d794df1}
凯撒部长的奖励
凯撒密码,用密码机器解密
SYC{here_Is_yOur_rEwArd_enjOy_It_Caesar_or_call_him_vIctOr_is_a_Excellent_man_if_you_want_to_get_his_informations_you_can_join_us}
一段Base64
用Converter工具解码,先Base64解码再Unescape一下再16进制ASCII解码(hex to text)一下再Unescape一下复制括号里面的参数,再10进制ASCII解码(dec to text)一下再Html解码一下再Html解码一下就出来了
flag{ctf_tfc201717qwe}
.!?
http://127.0.0.1/ook-master/
ook加密
flag{bugku_jiami}
+[]-
http://127.0.0.1/ook-master/
brainfuck加密
flag{bugku_jiami_23}
奇怪的密码
变异得凯撒密码,python脚本:
a = 'gndk{rlqhmtkwwp}z'
i = 0
flag = ''
while i < len(a):
num = ord(a[i])-(i+1)
flag+=chr(num)
i+=1
print(flag)
flag{lei_ci_jiami}
托马斯.杰斐逊
这个转盘加密,比如第一个密钥匙:2、密文匙:H
把转盘第二行单独提出来 2: <KPBELNACZDTRXMJQOYHGVSFUWI <
从H的地方一直剪切,把剪切的内容放在最前面,变成 2: <HGVSFUWIKPBELNACZDTRXMJQOY <
依次类推把14行都按这样的方式整一遍就得到这个:
2: <HGVSFUWIKPBELNACZDTRXMJQOY <
5: <CPMNZQWXYIHFRLABEUOTSGJVDK <
1: <BVIQHKYPNTCRMOSFEZWAXJGDLU <
3: <TEQGYXPLOCKBDMAIZVRNSJUWFH <
6: <SLOQXVETAMKGHIWPNYCJBFZDRU <
4: <XQYIZMJWAORPLNDVHGFCUKTEBS <
9: <WATDSRFHENYVUBMCOIKZGJXPLQ <
7: <CEONJQGWTHSPYBXIZULVKMRAFD <
8: <RJLXKISEFAPMYGHBQNOZUTWDCV <
14:<QWXPHKZGJTDSENYVUBMLAOIRFC <
10:<GOIKFHENYVUWABMCXPLTDSRJQZ <
13:<LTDENQWAOXPYVUIKZGJBMCSRFH <
11:<ENYSRUBMCQWVJXPLTDAOIKFZGH <
12:<SWAYXPLVUBOIKZGJRFHENMCQTD <
flag在倒数第六列。
flag{XSXSBUGKUADMIN}
不对可能是大小写问题,改成小写
flag{xsxsbugkuadmin}
zip伪加密
第二个14 00 后的09奇数是加密偶数是不加密,改成00,解压得到
flag{Adm1N-B2G-kU-SZIP}
告诉你个秘密(ISCCCTF)
636A56355279427363446C4A49454A7154534230526D6843
56445A31614342354E326C4B4946467A5769426961453067
推测是16进制转字符串:
cjV5RyBscDlJIEJqTSB0RmhCVDZ1aCB5N2lKIFFzWiBiaE0g
有大写有小写还有数字 推测是base64:
r5yG lp9I BjM tFhB T6uh y7iJ QsZ bhM
本来以为这就是flag
提交不对后来联想到之前做过的题
应该是对应键盘上的键位
tongyuan
提交不对......改成 flag{tongyuan}也不对.....
flag改成大写
TONGYUAN
这不是md5
666c61677b616537333538376261353662616566357d
十六进制转字符串
flag{ae73587ba56baef5}
贝斯家族
base91加密
flag{554a5058c9021c76}
富强民主
社会主义核心价值观加密解密
Pip install cve
echo "公正公正公正诚信文明公正民主公正法治法治友善平等和谐敬业和谐 富强和谐富强和谐文明和谐平等公正公正和谐法治公正公正公正文明和谐民主和谐敬业和谐平等和谐敬业和谐敬业和谐和谐和谐公正法治友善法治"|cve -d
flag{90025f7fb1959936}
python(N1CTF)
python逆向解密:
import base64,string,N1ES
key = "wxy191iss00000000000cute"
c = base64.b64decode("HRlgC2ReHW1/WRk2DikfNBo1dl1XZBJrRR9qECMNOjNHDktBJSxcI1hZIz07YjVx")
n1es = N1ES.N1ES(key)
f=""
for i in xrange(3):
for j in xrange(16):
for k in string.printable:
s="x"*i*16+"x"*j+k+"x"*(48-i*16-j-1)
e=n1es.encrypt(s)
check=c[i*16+j+8]==e[i*16+j+8] if j<8 else c[i*16+j-8]==e[i*16+j-8]
if check:
f+=k
break
print f
N1CTF{F3istel_n3tw0rk_c4n_b3_ea5i1y_s0lv3d_/--/}
进制转换
python2脚本
#-*-coding:utf-8-*-
s = ["d87","x65","x6c","x63","o157","d109","o145","b100000","d116","b1101111","o40","x6b","b1100101","b1101100","o141","d105","x62","d101","b1101001","d46","o40","d71","x69","d118","x65","x20","b1111001","o157","b1110101","d32","o141","d32","d102","o154","x61","x67","b100000","o141","d115","b100000","b1100001","d32","x67","o151","x66","d116","b101110","b100000","d32","d102","d108","d97","o147","d123","x31","b1100101","b110100","d98","d102","b111000","d49","b1100001","d54","b110011","x39","o64","o144","o145","d53","x61","b1100010","b1100011","o60","d48","o65","b1100001","x63","b110110","d101","o63","b111001","d97","d51","o70","d55","b1100010","d125","x20","b101110","x20","b1001000","d97","d118","o145","x20","d97","o40","d103","d111","d111","x64","d32","o164","b1101001","x6d","o145","x7e"]
flag = ""
for item in s:
s1 = str(item)
if(item[0:1]=="d"):
flag += chr(int(item[1:]))
if(item[0:1]=="x"):
flag += chr(int(item[1:],16))
if(item[0:1]=="o"):
flag += chr(int(item[1:],8))
if(item[0:1]=="b"):
flag += chr(int(item[1:],2))
print(flag)
Welcome to kelaibei. Give you a flag as a gift. flag{1e4bf81a6394de5abc005ac6e39a387b} . Have a good time~
flag{1e4bf81a6394de5abc005ac6e39a387b}
Affine
仿射密码(单码加密法的另一种形式称为仿射加密法(affine cipher))
#-*-coding:utf-8-*-
i=1
while(17*i%26!=1):
i+=1 #求出17的乘法逆元
x='szzyfimhyzd'
for i in range(len(x)):
print chr(23*(ord(x[i])-ord('a')+8)%26+ord('a')),
flag{affineshift}
Crack it
linux密码文件,拿到kali下破解,命令:
john shadow
解出hellokitty
flag{hellokitty}
Rsa
python RsaCtfTool.py --createpub -n 11111 -e 222222
python RsaCtfTool.py --publickey 1.pem --private >1.key
python RsaCtfTool.py --key 1.key --dumpkey
python脚本
#coding:utf-8
#已知pqe直接解密密文
import base64
def gcd(a, b): #求最大公约数
if a < b:
a, b = b, a
while b != 0:
temp = a % b
a = b
b = temp
return a
def egcd(a, b):
if a == 0:
return (b, 0, 1)
else:
g, y, x = egcd(b % a, a)
return (g, x - (b // a) * y, y)
def modinv(a, m):
g, x, y = egcd(a, m)
if g != 1:
raise Exception('modular inverse does not exist')
else:
return x % m
if __name__ == "__main__":
p=15991846970993213322072626901560749932686325766403404864023341810735319249066370916090640926219079368845510444031400322229147771682961132420481897362843199
q=28805791771260259486856902729020438686670354441296247148207862836064657849735343618207098163901787287368569768472521344635567334299356760080507454640207003
e = 354611102441307572056572181827925899198345350228753730931089393275463916544456626894245415096107834465778409532373187125318554614722599301791528916212839368121066035541008808261534500586023652767712271625785204280964688004680328300124849680477105302519377370092578107827116821391826210972320377614967547827619
# tmp = base64.b64decode("qzogS7X8M3ZOpkUhJJcbukaRduLyqHAPblmabaYSm9iatuulrHcEpBmil7V40N7gbsQXwYx5EBH5r5V2HRcEIOXjgfk5vpGLjPVxBLyXh2DajHPX6KvbFpQ8jNpCQbUNq8Hst00yDSO/6ri9dk6bk7+uyuN0b2K1bNG5St6sCQ4qYEA3xJbsHFvMqtvUdhMiqO7tNCUVTKZdN7iFvSJqK2IHosIf7FqO24zkHZpHi31sYU7pcgYEaGkVaKs8pjq6nbnffr4URfoexZHeQtq5UAkr95zD6WgvGcxaTDKafFntboX9GR9VUZnHePiio7nJ3msfue5rkIbISjmGCAlj+w==")
d = modinv(e, (p - 1) * (q - 1))
# c=s2n(tmp)
c = 38230991316229399651823567590692301060044620412191737764632384680546256228451518238842965221394711848337832459443844446889468362154188214840736744657885858943810177675871991111466653158257191139605699916347308294995664530280816850482740530602254559123759121106338359220242637775919026933563326069449424391192
# c = 225031483444634056931067907865853799650197225351377050632290334721073031287701730297815850654473721939907812470206115171738967740183098960272963323728747481560137205796840356532306950935686580268408289864109695494835661414073083573249882362332920722000099781994315336570711188934565379141406727420346806389405536474102730682155998263607095718543239272202402139286809779368710600842078606046563228470023546348908618719147790859257980882643030144242048154566691808688844513142261099020381730517293884263384819159874220288293023868919557980548807831273449743064237407705987056818011286315950476959812697067649075359373253
n = p*q
m=pow(c,d,n)
sss = hex(int(m)) #转换为16进制
#16进制转字符串
flag = ""
for i in range(2,len(sss)-1,2):
flag += chr(int(sss[i:i+2],16))
print(flag)
flag{Wien3r_4tt@ck_1s_3AsY}
来自宇宙的信号
标准银河字母(Standard Galactic Alphabet)出自游戏《指挥官基恩》系列。是系列中使用的书写系统。
对照标准银河字母:https://baike.baidu.com/item/标准银河字母/2691355#1
得到flag:
flag{nopqrst}
Bugku旧平台crypto writeup相关推荐
- Bugku旧平台misc writeup
流量分析 flag被盗 打开搜索flag字符串 flag{This_is_a_f10g} 中国菜刀 搜索flag发现flag.tar.gz 找到疑似包到处分组字节流保存为1.gz,rar打开看到fla ...
- Bugku旧平台web writeup
Web基础 Web2 查看网页源代码,搜索flag KEY{Web-2-bugKssNNikls9100} 计算器 审查元素修改输入字符串长度为2 flag{CTF-bugku-0032} web基础 ...
- bugku 新平台 web1 writeup
题目: 看题型主要出题思路是变量覆盖+RFI(远程文件包含) 知识点链接: 变量覆盖:https://www.cnblogs.com/xiaozi/p/7768580.html 远程文件包含:http ...
- CTF BugKu平台——Crypto篇刷题记录(后续更新)
CTF BugKu平台--Crypto篇 前言 抄错的字符: /.- 聪明的小羊: ok: [+-<>]: 把猪困在猪圈里: 你喜欢下棋吗: 小山丘的秘密: EN-气泡: 你以为是md5吗 ...
- Linux内核开发人员考虑剔除对更多老旧平台的处理器支持
随着 Linux 5.10 走入长期支持(LTS),内核开发人员也对未来五年的平台支持展开了探讨,比如剔除干线内核项目中的大量旧款 CPU 的支持. Phoronix 援引 Arnd Bergmann ...
- MTK旧平台与RDA8851开机详解
MTK6261D旧平台与RDA8851开机详解.注意,MTK新平台框架已经变了,所以开机流程与下面的有差异! L4是MMI/AT和协议栈的适配层. ATCI是AT命令解析器. UEM是用于抽象如键盘. ...
- 【2022 网鼎杯】青龙组 crypto WriteUp
2022 网鼎杯 青龙组 crypto WriteUp crypto091 crypto405 crypto162 文章目录 crypto091 crypto405 crypto162 crypto0 ...
- 【ByteCTF 2022】Crypto Writeup
ByteCTF 2022 密码 Crypto writeup Choose_U_flag Compare Card Shark 文章目录 1. Choose_U_flag 题目分析 初始化参数 加密过 ...
- 老笔记本电脑系统Linux,【转载】旧电脑新衣裳,国产linux操作系统旧平台短期体验...
原标题:[转载]旧电脑新衣裳,国产linux操作系统旧平台短期体验 我们一直在寻找个方法,让我们的旧电脑焕发新春.首先,介绍一下我们的旧平台: 主板:华硕M5A78 x3 plus cpu:AMD 速 ...
最新文章
- 要学习的别人的博客网址---收藏
- 在虚拟主机中无法实现缩放等交互
- autofac JSON文件配置
- Spark streaming java代码
- 学编程一定要掌握的186个关键单词!
- fibonacci数列前20项_高考数学二级结论——数列部分
- 02 - java 标识符命名规范
- Selenium学习(2) 元素定位
- c# 在winform中为DataGridView头部标题添加ContextMenuStrip菜单
- 魔百和服务器网站,【当贝市场】魔百盒首页诊断显示网络异常解决办法
- 【2022 李宏毅】机器学习导论
- 解析《啊哈C》--最终章:用C语言制作走迷宫和推箱子的小游戏
- (转)sonicstage 完整删除的方法
- tensorflow padded_batch的注意事项
- 证书生成(keystore、truststore、.crt、.key)。
- 中国计量大学现代科技学院第四届“中竞杯”程序设计校赛(同步赛)F.爬塔
- vue点击定位到指定位置_vue页面内部定位到锚点位置
- 使用 ClickHouse 构建通用日志系统
- 腾讯大王卡免费申请工具 申请入口_一键申请 低价流量卡办理入口
- 超好用的思维导图网站