【36D杯】密码学_飞鸽传书

admin 2022年1月5日22:51:12CTF专场评论7 views2412字阅读8分2秒阅读模式

>

>

【36D杯】密码学_飞鸽传书

hdxw

掏出武器库一顿怼

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

base64解码:https://www.qqxiuzi.cn/bianma/base64.htm

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

再解base64

1b08af276dbc7593271f4ee616289324%0Ae2ae3a2350743c516cda412499ba3be9%0Abde52cb31de33e46245e05fbdbd6fb24%0Ae23e00be39d36f3462e576a67a7f9199%0A18c79285b514c63fc9035e3f920ae477%0Ada44dd192defd1be79f63c350d2920cf%0A4251c4c649c7d2f86327efde23992fa7%0Aaae7b2d482382aaad75fde64df8ff86f%0A296f7ffc2e4545dc7792050ceb4a8711%0A6107ac1a55f1e0fecb7ddb60fb3bf109%0Aaec2333321d73000161682d3c4ebc009%0A5005b3bf00050bf4f7e43ac33a0454b8%0A

有%0A,url解码:http://tool.chinaz.com/tools/urlencode.aspx

1b08af276dbc7593271f4ee616289324
e2ae3a2350743c516cda412499ba3be9
bde52cb31de33e46245e05fbdbd6fb24
e23e00be39d36f3462e576a67a7f9199
18c79285b514c63fc9035e3f920ae477
da44dd192defd1be79f63c350d2920cf
4251c4c649c7d2f86327efde23992fa7
aae7b2d482382aaad75fde64df8ff86f
296f7ffc2e4545dc7792050ceb4a8711
6107ac1a55f1e0fecb7ddb60fb3bf109
aec2333321d73000161682d3c4ebc009
5005b3bf00050bf4f7e43ac33a0454b8

看着像md5,跑一下,工具根据名字自行github搜索

显示ttmd5解出来了,网址:http://www.ttmd5.com/
在线解一下(不用登陆),显示密文类型是md4

每个都解一下(解中间6个就行了),连在一起就是flag
flag{36D_me}


admin

pwcrack好工具,get到了


main

能讲一下这一题的思路吗?


特别标注: 本站(CN-SEC.COM)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
  • 我的微信
  • 微信扫一扫
  • weinxin
  • 我的微信公众号
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2022年1月5日22:51:12
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                  【36D杯】密码学_飞鸽传书 http://cn-sec.com/archives/719364.html

发表评论

匿名网友 填写信息

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: