第三题猜猜这是经过了多少次加密?分值: 200

加密后的字符串为:一大串
字符串最后面是=
所以是base64.b64decode编码究竟为啥有=就是base64咱也不知道 咱也不敢问咋解密也是从网上随便搜来的我也不会

代码如下

 1 import base64
 2 code = 'Vm0wd2QyUXlVWGxWV0d4V1YwZDRWMVl3WkRSV01WbDNXa1JTVjAxV2JETlhhMUpUVjBaS2RHVkdXbFpOYWtFeFZtcEJlRll5U2tWVWJHaG9UV3N3ZUZadGNFZFpWMDE1VTJ0V1ZXSkhhRzlVVjNOM1pVWmtWMXBFVWxSTmF6RTBWMnRvUjFWdFNrZFhiR2hhWVRKb1JGWldXbUZqVmtaMFVteFNUbUY2UlRGV1ZFb3dWakZhV0ZOcmFHaFNlbXhXVm1wT1QwMHhjRlpYYlVaclVqQTFSMXBGV2xOVWJGcFlaSHBHVjFaRmIzZFdha1poVjBaT2NtRkhhRk5sYlhoWFZtMXdUMVF3TUhoalJscFlZbFZhY1ZadGRHRk5SbFowWlVoa1YwMUVSa1pWYkZKSFZqRmFSbUl6WkZkaGExcG9WakJhVDJOdFJraGhSazVzWWxob1dGWnRNSGRsUjBsNFUydGtXR0pIVWxsWmJGWmhZMnhXYzFWclpGZGlSbkJaV2xWYVQxWlhTbFpYVkVwV1lrWktTRlpxU2tabFZsWlpXa1prYUdFeGNGbFhhMVpoVkRKTmVGcElUbWhTTW5oVVZGY3hiMWRzV1hoWGJYUk9VakZHTlZaWE5VOWhiRXAwVld4c1dtSkhhRlJXTUZwVFZqSkdSbFJzVG1sU2JrSmFWMnhXWVZReFdsaFRiRnBZVmtWd1YxbHJXa3RTUmxweFVWaG9hMVpzV2pGV01uaHJZVWRGZWxGcmJGaFhTRUpJVmtSS1UxWXhXblZWYldoVFlYcFdlbGRYZUc5aU1XUkhWMjVTVGxkSFVsWlVWbHBIVFRGU1ZtRkhPV2hpUlhCNldUQmFjMWR0U2toaFJsSlhUVVp3VkZacVNrZFNiRkp6Vkcxc1UySnJTbUZXTW5oWFdWWlJlRmRzYUZSaVJuQlpWbXRXZDFZeGJISlhhM1JUVW14d2VGVXlkR3RoYlVwV1ZtcGFXbFpXY0doWlZXUkdaVWRPU0U5V1pHaGhNSEJ2Vm10U1MxUXlVa2RVYmtwaFVteEtjRlpxVG05V1ZscEhXVE5vYVUxWFVucFdNV2h2V1ZaS1IxTnVRbFZXTTFKNlZGUkdVMVp0UmtoUFZtaFRUVWhDU2xac1pEUmpNV1IwVTJ0a1dHSlhhR0ZVVnpWdlYwWnJlRmRyZEdwaVZrcElWbGQ0VDJGV1NYcFpNMmhYWVRGd2FGWlVSbFpsUm1SMVUyczFXRkpZUW5oV1YzaHJUa2RHUjFaWVpHaFNWVFZVVlcxNGQyVkdWbGRoUnpsb1RWWndlbFl5Y0VkV01ERjFZVWhLV2xaWFVrZGFWM2hIWTIxS1IxcEdaRTVOUlhCS1ZtMTBVMU14VlhoWFdHaFlZbXhhVmxsclpHOWpSbHB4VkcwNVYxWnRVbGhXVjNNMVZXc3hXRlZyYUZkTmFsWlVWa2Q0WVZKc1RuTmhSbFpYWWxaRmQxWnFRbUZaVm1SSVZXdG9hMUp0YUZSVVZXaERVMnhhYzFwRVVtcE5WMUl3VlRKMGIyRkdTbk5UYkdoVlZteHdNMVl3V25KbFJtUnlaRWR3YVZacmNFbFdiR1EwWVRKR1YxTnVVbEJXUlRWWVZGYzFiMWRHYkhGVGExcHNVbTFTV2xkclZURldNVnB6WTBaV1dGWXpVbkpXVkVaelZqRldjMWRzYUdsV1ZuQlFWa1phWVdReVZrZFdXR3hyVWtWS1dGUldXbmRsVm10M1YyNWtXRkl3VmpSWk1GSlBWMjFGZVZWclpHRldNMmhJV1RJeFMxSXhjRWhpUm1oVFZsaENTMVp0TVRCVk1VMTRWbGhvV0ZkSGFGbFpiWGhoVmpGc2MxcEhPVmRTYlhoYVdUQmFhMkpIU2toVmJHeGhWbGROTVZsV1ZYaFhSbFp5WVVaa1RtRnNXbFZXYTJRMFV6RktjMXBJVmxSaVJscFlXV3RhZDA1c1draGxSMFphVm0xU1IxUnNXbUZWUmxsNVlVaENWbUpIYUVOYVJFWmhZekZ3UlZWdGNFNVdNVWwzVmxSS01HSXlSa2RUYms1VVlrZG9WbFpzV25kTk1WcHlWMjFHYWxacmNEQmFSV1F3VmpKS2NsTnJjRmhpUmxweVdYcEdWbVZXVG5OaVJuQk9UVzFvV1ZkV1VrZGtNa1pIVjJ4V1UySkdjSE5WYlRGVFRWWlZlV042UmxkTlZuQjZXVEJhVjFkR1duTlRhMmhoVWtWYWNsVnFTa3RUVmxKMFlVWk9WMVpHV2pKV2JHTjRUa2RSZVZaclpGZFhSM2h5VldwT1UySXhiSE5XYm1SWFRWWndNRmt3WkVkWFIwcEhZMFpvV2sxSFVuWldNbmhoVjBaV2NscEhSbGRXTVVwUlZsUkNhMUl4U1hsU2EyaHBVbXMxY0ZsVVFuZE5iRnAwVFZSQ1ZrMVZNVFJXVnpWVFZqSkZlVlZ1UmxaaVIxRXdWbTE0YzJNeGNFaFBWbVJUWWtWd1dsWkhlR3BPVmxsNFYyNVNWbUpIYUZoV2FrNU9UVlphV0dNemFGaFNiRnA2V1ZWYWExUnNXWGxoUkVwWFRWWndhRlY2Umt0ak1WSjFWV3hPYVZJeFNuZFdha0pXVFVVeFIxZHJhR3RTTUZwdlZGZHpNV1ZzV1hsT1ZrNW9UVlZ3TUZaWE5VTldNa3BJWVVWU1ZXSllhR2hXYkZwUFZsWktjMVpyTlZkaWEwWXpWbXhqZDAxV1RYaFhhMmhVWWtkb2IxVnFRbUZXYkZwMFpVaGtUazFZUWxsYVZXaExZa1paZUZkcmNGaGhNWEJRVm1wS1JtVkhUa1ZXYkdSVFVsWndlVmRZY0VkV2JWRjNUVlZzYVZJeWFGUlpiR2h2VjFaa1dHVkhPVkpOVlRFMFdUQmFZVll4WkVoaFJsSlZWbTFTVkZwWGVITldiR1J6Vkcxb1YyRXpRWGhXVm1RMFpERlplVk5zYkZaaVIyaG9WV3RXWVdOc1ZuRlRhM1JVVm1zMU1GVnRlRTlpUjBwWllVUlNWMDFYVVhkWFZtUlNaVlphY2xwR1pGaFNNMmg1Vmxkd1ExbFhUa2RXYmxKc1UwZFNjMWxyV25OT1ZuQldZVWQwV0ZKcmJETldiWEJUVjJzeFIxTnNRbGROYWtaSFdsWmFWMk5zY0VoU2JHUk9UVzFvU2xZeFVrcGxSazE0VTFob2FsSlhVbWhWYkZKWFZERldjMkZGVGxSTlZuQXdWRlpTUTFack1WWk5WRkpYWWtkb2RsWXdXbXRUUjBaSVlVWmFUbEp1UW05V2JURTBZekpPYzFwSVNtdFNNMEpVV1d0b1EwNUdXbkpaTTJSUFZteHNORll5TlU5aGJFcFlZVVpzVjJFeFZYaGFSM2h6VmpGYVdXRkdhRk5pUm5BMlYxWldZV0V4VW5OWFdHeG9Va1Z3V0ZSV1duZGhSbFkyVW10MGFrMVdTakZXVjNoRFZqSktSMk5HYkZoV00xSjJWVlJHVTFZeGNFbFViR2hwVmxad1dGWkdXbUZqTURWSFYxaHNUMVpyTlc5VVZsWnpUbFpzVm1GRlRsZGlWWEJKV1ZWV1UxWXdNVmRqUjJoYVRWWndVRmt4V2xkak1XUnlUbFprVGxaWGQzcFdiWGhUVXpBeFNGTlliRk5oTWxKVldXMXpNVlpXYkhKYVJ6bFhZa1p3ZWxZeU5XdFVhekZZWlVaa1YwMXFWbkpXVkVwTFUxWkdjbUZHWkZOTk1taFZWbTF3UzFNeVRuTlVia3BvVW0xU1ZGUlVTbTlpTVZweVZXdDBVMDFYVWtoVk1uaHpXVlpKZWxGc1VsZGhhelYyVmpGYWExZEhWa2hQVmtwT1ZtdHdTVmRVUW1GaU1rWjBWbTVLV0dKSGVGZFpiR2hUVFRGd1YxZHRkR3BpUjFJd1ZERmtiMVl3TVVkaE0yeFhZbFJCZUZscVJscGxSbVJ5VjJ4U2FXSklRbGhXYlhSWFdWZFdjMWR1UmxOaVIxSnhWRlprVTJWc2JGWmFTRTVvVm14d2VWa3dVbUZXTURGWVZWaGtXRlp0VWxOYVZscGhZMnh3UjFwR2FGTk5NbWcxVm14a01GWXhUWGhhUldSV1lrZFNXVmx0TVZOak1WcDBaVWhPVDFadVFsZFpWV1F3VjBaSmQyTkZhRnBOUm5CMlZqSnplRk5IUmtabFJtUk9ZbTFvYjFacVFtRldNazV6WTBWb1UySkhVbGhVVmxaM1ZXeGFjMVZyVGxkaGVsWllWakZvYjJGc1NsaGhSemxXWVd0d2RsWkVSbFprTVZweVpFVTFhVkp1UVhkWGJGWnFUbGRGZDAxV1drNVdSa3BZVm0weGIyUnNXWGRYYlhSVVVqQmFTbFZ0ZUdGaFZrbDRVbGhrVjJKVVJUQlpla3BPWlVaa2RWVnNUbWxTTVVwVlYxZDBWMlF4WkhOWGEyaHNVak5DVUZadE1WTlRSbGw1VGxVNWFHSkZjREJhVldSSFZsWmFWMk5HWkZWV2JIQjZWbXBHWVZkWFJraGpSMnhYVjBWS1NGWnRlR3RPUjBWNFZXNVNVMkpyTlZsWmExcGhWMVphZEUxV1NrNVNiRmt5VlcweFIyRnRSalpXYkdoYVlURndURmxXV2t0ak1rNUhZa1pvVjAweFNtOVhhMUpIWVRGWmVGcElTbWhTTTFKVVZGVmFkMWRXV2tkYVNIQnNVbFJXV0ZadE5WTmhNVW8yWWtaa1ZtSllhSHBVYkZwelZtMUdSbFJzWkdsV1dFSktWMVpXVjFVeFdYZE5WbVJxVWpKb1lWUldXbmRWUm10NFYyeGthazFYVW5sVWJGcHJWR3hhV0dRemNGZGlXR2hVVlhwQmVGTkdTbGxoUjBaVFZqSm9WbGRYZEd0aU1rbDRWbTVTVGxaNmJHRldiWGgzWlZaYWRFMVZaRlZoZWtaWldsVmFhMVl3TVhGV2JrcFhWa1Z3VEZVeFdrZGpiVVpIV2taT1RrMXRhRlpXYlRGM1V6Rk5lVlJ1VGxWaWEzQnhWVzB4YjJOR1ZuUmxTR1JwVFZkU1dGWlhkREJWTURGWFlrUlNWMUl6YUhwWlYzaExaRlpHY2s5V1ZsZGxhMW95Vm1wR1lWbFdTWGhpUkZwVFlsZDRUMVpxUmt0VFZscHhVMVJHVTAxV1ZqVlZNblJoWVd4T1JrNVdaRnBpUmtwSVZtdGFXbVZYVmtoa1IzQnBVbTVDVjFaWE1UUmlNVlY1VWxod1VtSlZXbGhXYlRGU1RVWnNObEp0ZEZOTlYxSXhWbGQ0WVdGSFNrbFJiR1JYWWxSRk1GcEVTbGRqTVdSMVVteE9hVkl4U25oV1JscHJWVEpXYzJKR1dtRlRSVFZ2Vm0xNGQyVldhM2RYYm1SWFRXdHdTVlpIY0ZOV1YwVjVWV3hPWVZac2NHaFpNbmgzVWpGd1NHSkhiRk5YUlVwU1ZtMHdlRTVIUlhoV1dHaGhVbGRTVjFsclduZFdNV3hWVTJ4T2FrMVdjREJhVlZZd1lrZEtSMk5FUWxWV1ZrcFlWbXBCZUZKV1NuTmFSbkJwWW10S1RWWnRNSGhUTVdSWFZtNVdXR0pIVW05WlZFWjNZakZhV0UxVVVtaE5helV3Vm0xMGExbFdTWGxoUnpsVlZrVktURlpYZUdGak1XdDZZVVU1VTJKWWFGcFdhMXB2WWpKR2MxTnNhR2hUUlVwWFdXeG9UbVZHV2tWU2JVWnFUVmRTZWxrd1pEUmhWa3AxVVZoa1dHSkdXbkpWYWtaaFkyc3hWMWR0YkZOU2EzQm9WMVpTUjJReVRuTlhXR1JoVWxoU2NWbHNWVEZTTVZGNFYyMTBhRlp0VWtsWGFrNTNWakpHY2xOdGFGcGxhMXB5VmpCYVUyTnNjRWhTYkU1cFZtdHdWbFl4WkRCWlYxRjNUbFprV0dKc1NrOVdhMVpMV1ZaYWRHVkZaRTlTYkhBd1dsVmFhMVpYU2taalJXeGFUVE5DZVZWR1JUbFFVVDA5'
 3 count = 0
 4 try:
 5     while True:
 6         code = base64.b64decode(code)
 7         count = count + 1
 8 except :
 9
10     print("经过了" + str(count) + "次加密")
11     print('解密后结果为:' +str(code))

运行结果

1 经过了20次加密

2 解密后结果为:b'key is jkljdkl232jkljkdl2389'


第五题种族歧视分值: 300

小明同学今天访问了一个网站,竟然不允许中国人访问!太坑了,于是小明同学决心一定要进去一探究竟! 
通关地址
使用培训时学长发的爬取学校官网代码,经过简单改装
把网址改成通关地址,
因为不允许中国人访问的,方式是限制中文,究竟为啥是限制中文咱也不知道 咱也不敢问
把请求头中的Accept-Language: 删去中文部分,只保留其他文字

修改请求头

1 Host: lab1.xseclab.com
2 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:66.0) Gecko/20100101 Firefox/66.0
3 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
4 Accept-Language: q=0.5,en-US;q=0.3,en;q=0.2
5 Accept-Encoding: gzip, deflate
6 Connection: keep-alive
7 Upgrade-Insecure-Requests: 1
8 Pragma: no-cache
9 Cache-Control: no-cache

代码如下

1 import requests
2 url = "http://lab1.xseclab.com/base1_0ef337f3afbe42d5619d7a36c19c20ab/index.php"
3 headers = {'Accept-Language': 'q=0.5,en-US;q=0.3,en;q=0.2'}
4 r = requests.get(url,headers=headers)
5 r.encoding = r.apparent_encoding
6 r.encoding = 'utf-8'
7 print(r.text)

运行结果

1 <html>
2          <head>
3         <meta http-equiv="content-type" content="text/html;charset=utf-8">
4     </head>
5     <body>
6         key is: *(TU687jksf6&*


第六题HAHA浏览器分值: 200

据说信息安全小组最近出了一款新的浏览器,叫HAHA浏览器,有些题目必须通过HAHA浏览器才能答对。小明同学坚决不要装HAHA浏览器,怕有后门,但是如何才能过这个需要安装HAHA浏览器才能过的题目呢? 
通关地址
同第五题一致,这次修改浏览器的请求头User-Agent:后面改成HAHA即可

修改请求头

1 Host: lab1.xseclab.com
2 User-Agent: HAHA
3 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
4 Accept-Language: q=0.5,en-US;q=0.3,en;q=0.2
5 Accept-Encoding: gzip, deflate
6 Connection: keep-alive
7 Upgrade-Insecure-Requests: 1
8 Pragma: no-cache
9 Cache-Control: no-cache

代码如下

1 import requests
2 url = "http://lab1.xseclab.com/base1_0ef337f3afbe42d5619d7a36c19c20ab/index.php"
3 headers = {'User-Agent': 'HAHA'}
4 r = requests.get(url,headers=headers)
5 r.encoding = r.apparent_encoding
6 r.encoding = 'utf-8'
7 print(request.get_header('User-agent'))
8 print(r.text)

运行结果

1 <html>
2          <head>
3         <meta http-equiv="content-type" content="text/html;charset=utf-8">
4     </head>
5     <body>
6         用浏览器才可以!

说明出现了问题

问题分析

1.爬虫被检测?

后来莫名其妙就解决了?我啥也没动?

1 <html>
2          <head>
3         <meta http-equiv="content-type" content="text/html;charset=utf-8">
4     </head>
5     <body>
6         恭喜您,成功安装HAHA浏览器!key is: meiyouHAHAliulanqi

代码还是这个代码

1 import requests
2 url = "http://lab1.xseclab.com/base6_6082c908819e105c378eb93b6631c4d3/index.php"
3 headers = {'User-Agent': 'HAHA'}
4 r = requests.get(url,headers=headers)
5 #r = requests.get(url)
6 r.encoding = r.apparent_encoding
7 r.encoding = 'utf-8'
8 print(r.text)


第七题key究竟在哪里呢?分值: 200

上一次小明同学轻松找到了key,感觉这么简单的题目多无聊,于是有了找key的加强版,那么key这次会藏在哪里呢? 
通关地址

这次答案藏在了响应头
究竟为啥是在响应头咱也不知道 咱也不敢问

代码如下

 1 import urllib.request
 2 import random
 3 url="http://lab1.xseclab.com/base7_eb68bd2f0d762faf70c89799b3c1cc52/index.php"
 4 headerUserAgentList=['Mozilla/5.0(compatible;MSIE9.0;WindowsNT6.1;Trident/5.0',
 5 'Mozilla/5.0(Macintosh;IntelMacOSX10.6;rv:2.0.1)Gecko/20100101Firefox/4.0.1']
 6
 7 randomHeaderUserAgent=random.choice(headerUserAgentList)#随机取值
 8 request=urllib.request.Request(url) #构建请求链接
 9 request.add_header('User-Agent',randomHeaderUserAgent) #添加User-agent
10 response=urllib.request.urlopen(request)
11 print(request.get_header('User-agent'))
12 print(request.headers)#打印请求头信息
13 print(response.headers)#打印响应头信息

运行结果

1 Mozilla/5.0(compatible;MSIE9.0;WindowsNT6.1;Trident/5.0
2 {'User-agent': 'Mozilla/5.0(compatible;MSIE9.0;WindowsNT6.1;Trident/5.0'}
3 Server: nginx
4 Date: Thu, 25 Apr 2019 13:45:04 GMT
5 Content-Type: text/html
6 Transfer-Encoding: chunked
7 Connection: close
8 Key: kjh%#$#%FDjjj
9 Via: 100167


第八题key又找不到了分值: 350

小明这次可真找不到key去哪里了,你能帮他找到key吗? 
通关地址
个人问题暂未发现python方法

第九题冒充登陆用户分值: 200

小明来到一个网站,还是想要key,但是却怎么逗登陆不了,你能帮他登陆吗? 
通关地址

继续修改请求头把COOKIE的0改成1
究竟为啥是在请求头咱也不知道 咱也不敢问

代码对比

 1 import requests
 2 url = "http://lab1.xseclab.com/base9_ab629d778e3a29540dfd60f2e548a5eb/index.php"
 3 headers = {'Cookie': 'Login=0'}
 4 r = requests.get(url,headers=headers)
 5 #r = requests.get(url)
 6 r.encoding = r.apparent_encoding
 7 r.encoding = 'utf-8'
 8 print(r.text)
 9
10 import requests
11 url = "http://lab1.xseclab.com/base9_ab629d778e3a29540dfd60f2e548a5eb/index.php"
12 headers = {'Cookie': 'Login=1'}
13 r = requests.get(url,headers=headers)
14 #r = requests.get(url)
15 r.encoding = r.apparent_encoding
16 r.encoding = 'utf-8'
17 print(r.text)

运行结果

 1 <html>
 2          <head>
 3         <meta http-equiv="content-type" content="text/html;charset=utf-8">
 4     </head>
 5     <body>
 6         您还没有登陆呢!
 7     </body>
 8 </html>
 9 <html>
10          <head>
11         <meta http-equiv="content-type" content="text/html;charset=utf-8">
12     </head>
13     <body>
14         key is: yescookieedit7823789KJ


第十题比较数字大小分值: 100

只要比服务器上的数字大就可以了!
通关地址
根据网站源码可知,只能提交3位数的值
 1 <html>
 2     <head>
 3         <meta http-equiv=Content-Type content="text/html;charset=utf-8">
 4     </head>
 5     <body>
 6                 <form action="" method="post">
 7             <input type="text" maxlength="3" name="v"/>
 8             <input type="submit" value="提交"/>
 9         </form>
10     </body>
11 </html>

传个比三大的就行了

代码如下

1 import urllib.request
2 import urllib.parse
3 url="http://lab1.xseclab.com/base10_0b4e4866096913ac9c3a2272dde27215/index.php"
4 mydata=urllib.parse.urlencode({
5     "v":"99999"
6 }).encode("utf-8")
7 req=urllib.request.Request(url,mydata)
8 data=urllib.request.urlopen(req).read()
9 print(data)

运行结果

 1 b'<html>\n
 2   <head>\n
 3         <meta http-equiv=Content-Type content="text/html;charset=utf-8">\n
 4  </head>\n
 5  <body>\n
 6           <form action="" method="post">\n
 7        <input type="text" maxlength="3" name="v"/>\n
 8      <input type="submit" value="\xe6\x8f\x90\xe4\xba\xa4"/>\n
 9   </form>\n
10  </body>\n
11 </html>\n
12 key is 768HKyu678567&*&K'


转载于:https://www.cnblogs.com/hx97/p/10771061.html

#033 信安培训基础题Python解决网络安全实验室|网络信息安全攻防学习平台相关推荐

  1. 网络安全实验室|网络信息安全攻防学习平台(基础关)

    第一题:key在哪里? http://lab1.xseclab.com/base1_4a4d993ed7bd7d467b27af52d2aaa800/index.php CTRL+U 查看源码发现ke ...

  2. 网络信息安全攻防学习平台——基础关

    本文首发链接 查看我的个人博客:https://hubinqiang.com 网络信息安全攻防学习平台基础关 第1题 题目:key在哪里? 过关地址 方法:直接查看网页源代码即可查到key. Key: ...

  3. 网络信息安全攻防学习平台-基础关

    网络信息安全攻防学习平台-基础关 游戏地址[http://hackinglab.cn/ShowQues.php?type=bases] 第一题 key在哪里? 这类题时最简单的,一般只需在浏览器内打开 ...

  4. 网络安全特训之——网络信息安全攻防学习平台(基础关)

    网络信息安全攻防学习平台(基础关) 一.key在哪里 项目场景: 解决方法: 二.再加密一次你就得到key啦 项目场景 解决方法: 三.猜猜这是经过了多少次加密 项目场景: 解决方法: 四.据说MD5 ...

  5. 网络安全实验室|网络信息安全攻防 (1)基础关卡

    选择题非常简单,一路直接搞定. 基础关卡: key在哪里?http://lab1.xseclab.com/base1_4a4d993ed7bd7d467b27af52d2aaa800/index.ph ...

  6. 网络信息安全攻防学习平台(基础关)

     目录 key在哪里? 再加密一次你就得到key啦~ 猜猜这是经过了多少次加密? 据说MD5加密很安全,真的是么? 种族歧视 HAHA浏览器 key究竟在哪里呢? ​编辑key又找不到了 冒充登陆用户 ...

  7. 网络黑客攻防学习平台之基础关第三题

    网络黑客攻防学习平台之基础关第三题 : 页面地址:http://hackinglab.cn/ShowQues.php?type=bases 给出的是一段base64加密后的密文,根据标题,肯定是多次加 ...

  8. 网络黑客攻防学习平台之基础关第十一题

    网络黑客攻防学习平台之基础关第十一题 : 本地的诱惑 小明扫描了他心爱的小红的电脑,发现开放了一个80端口,但是当小明去访问的时候却发现只允许从本地访问,可他心爱的小红不敢让这个诡异的小明触碰她的电脑 ...

  9. 网络黑客攻防学习平台之基础关第二题

    网络黑客攻防学习平台之基础关第二题 : 页面地址:http://hackinglab.cn/ShowQues.php?type=bases 题解:加密后的数据再加密一次就得到了密文,这正是rot-13 ...

最新文章

  1. VC++、MFC最好的开源项目
  2. mysql decode语句_mysql数据灾难恢复方案
  3. 清空list_3. Python3轻食丨一个故事看懂List所有用法:1年级1班的班级生活
  4. java78条注意事项
  5. 舍本求末的运维自动化技术热潮
  6. 安卓项目中文件夹的作用
  7. 命令执行漏洞-命令执行-漏洞位点- 代码注入-漏洞利用-联合执行-Bypass(空格,关键字过滤,变量绕过)-例题两道-actf2020exec-GXYCTF2019 Ping Ping Ping
  8. 基于MapWinGis的开发探索(三)--改善缩放、渲染、显示文本
  9. ROS笔记之回调函数
  10. python进阶06并发之二技术点关键词
  11. 0基础学python要多久-零基础学习Python开发需要多长时间?
  12. Javascript 535种方式!!!实现页面重载
  13. java swing图书管理系统 java swing mysql实现的图书管理系统源码(1023)
  14. 数学建模算法与应用:预测算法(4)马尔可夫预测
  15. 云闪付app怎么删除常用转账人?云闪付转账记录怎么删除?
  16. BLE蓝牙协议栈杂谈
  17. wei dian 使用的一点小技巧
  18. 检查更新时出错:无法启动更新检查(错误代码为 3: 0x80040154)
  19. 分享一个C语言矿井逃生迷宫小游戏【附源码】
  20. arcgis里dem填洼_基于多尺度窗口的DEM局部填洼方法

热门文章

  1. JavaScript学习 第一课(一)
  2. 开菜鸟驿站需要什么条件?投入成本大概要多少?
  3. 实体经济的“数字化”是不可逆转的趋势
  4. 垄断者 Google Chrome 若被迫分拆,谁将会接盘?
  5. Now, using the touch-screen smartphone in your hand
  6. Using APIs in Your Ethereum Smart Contract with Oraclize
  7. 计算机网络class1(概念、组成、功能和分类)
  8. php打印订单,WooCommerce: 打印订单
  9. 解决正在等待响应_解决一些等待问题
  10. SQL Server 2019中的证书管理