The remaining topics crypto attack and defense in the world novice area wp

1. runner Encryption

Here Insert Picture Description
Principles of the question is: is as plain text can be derived by back key and the ciphertext, so we can use the corresponding ciphertext and a key turning thrust reverser according to given subject, a first embodiment ciphertext is N the first key is 2, and therefore find labeled "runner" 2 to find N, N would like to turn the wheels, like the first, once placed on the front of the N last.
Finally get this result
Here Insert Picture Description
to see a column, you can find even one sentence of Flag
fireinthe Hole

2.easychallenge

Subject to an attachment, suffix .pyc
how open, a little ignorant.
By Baidu know,
the original Python program, is the original program code in a .py file, and will be in the implementation of Python .py file. .Py program will be compiled into an intermediate form of document type (byte-compiled) of .pyc file, The goal is to accelerate the implementation of the next file speed.

So, when we run python file, it will automatically .pyc first check whether the files, if any, and .py file modification time and modification time .pyc, like .pyc reads the file, otherwise , Python will read the original .py file.

In fact, not all .py files are generated when .pyc file and run, only import the corresponding .py file, will generate the corresponding .pyc file
so we need to get the source code files .py

Here Insert Picture Description
Here Insert Picture Description
Find ciphertext
Here Insert Picture Description
according to the source code to write the script Backward
first with base32 and decryption, proceed as follows

b = ''
for i in b:
    b += chr((ord(i) ^ 36) - 36)
a = ''
for i in b:
    a += chr((ord(i) - 25) ^ 36)
print ('flag is ',a)

Can be obtained In Flag
cyberpeace} {interestinghhhhh

3. just morse

There is a principle decode Morse code and a related question, the old way of press morse
Here Insert Picture Description

To obtain this result, the structure of bacon ciphertext codes, then again the decrypted flag
Here Insert Picture Description

Published 12 original articles · won praise 0 · Views 148

Guess you like

Origin blog.csdn.net/newly00/article/details/104374746