Summary of Monyer hacking game

In the "Computer Enthusiast" magazine, I stumbled upon an article on a website introducing hacking games (Second-hand Sanhao Street "Finding a Website to Be a Hacker", 2005 Issue 1), and then I realized that more than "Computer News" had engaged in hacking games. , There are many such online hacking mini games to break through.

Then I found a little hacker game developed by Monyer from Baidu. Most of the levels are done by yourself. But it was really stuck in 3 levels and had to check the strategy. These levels are 9, 11, and 12.

Level 9

A picture of a young lady, the page claims "You have to look inside the picture, look carefully!". According to my past experience, I may hide the information in EXIF ​​information or other additional information, and use IrfanView and Photoshop7.0 to view them, but the results are nothing.

The guide says that the answer is hidden in the binary text of the picture, that is, it needs to be opened and viewed with a plain text editor.

This place is indeed inadequate, and I have never encountered such a situation of hiding information in binary text. At least not in the actual operation. Although I have seen relevant records in the 2007 bound edition of Computer News.

Level 11

This is typically cheated by the prompt text on the page. The page claims "your session is not a passer". I quickly go to the F12 Application and choose Session Storage, but I don’t know what to fill in the Key value! After several attempts to no avail, after reading the guide, I realized that I was thinking too well. It is not controlled by the Session, and I will use Session a lot when I do web development.

It is a feature of the address bar show_login_false.

This may have the essentials of English base (although I also had six levels of English _ ), you know that a bunch of extra address bar displays the login is set to "false."

Level 12

A long string of codes. But I really haven't studied cryptography or something. I don't have much experience in judging the characteristics of this purely encrypted string. Only after knowing that it is a string encrypted with Base64 can it be decrypted. The next two encryptions and encodeURIwhat are all clouds. The key to the problem is how to know that this code is a Base64-encrypted string . Those who need cryptography need to have at least a little experience, not to mention the basics.

Guess you like

Origin blog.csdn.net/qq_35977139/article/details/107207184