一:古典密码
一只小羊跳过了栅栏,密码如下:
GpKlCeT_FC{rAy_pStiym}
栅栏解密——>11栏
二:滴滴滴
--./-.-/-.-./-/..-./----.--/-../../-../../-../../-../../-../../-./-/./.-././.../../-./--./-----.-
摩尔斯电码——>g k c t f [错误电码: ----.--] d i d i d i d i d i n t e r e s i n g [错误电码: -----.-]
——>去掉汉字空格,将所有改成大写,加上括号
三:奇怪的flag
这个flag格式好像是正确的,可是怎么提交不对呢?
HLDUG{Hppe_Gps_Dszqup}
凯撒加密爆破1~26——>GKCTFzGOOD^FOR^CRYPTO|——>修改:GKCTF{GOOD_FOR_CRYPTO}——>继续修改:GKCTF{Good_For_Crypto}
四:贝斯
R0tDVEZ7UmlnaHQhX0lzX2Jhc2U2NH0=
解密网址:http://encode.chahuo.com/——>base64解密
五:贝斯2
data:image/png;base64,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
Png、base64——>base转图片http://imgbase64.duoshitong.com/
——>
——>扫码发现:GKCTF{BASE64_233333333}——>(PS、ctrl+i反色)
六:ARE YOU OK?
+++++ +++[- >++++ ++++< ]>+++ ++++. ++++. ----- ---.< ++++[ ->+++ +<]>+
.<+++ [->-- -<]>- ----. <++++ +++[- >++++ +++<] >++++ .<+++ [->-- -<]>-
--.-- --.<+ ++[-> ---<] >---. <++++ ++[-> ----- -<]>- ----- ----. +.+.+
.<+++ +++[- >++++ ++<]> +++++ ++.++ .+++. +++++ ++++. ----. +++++ .<+++
[->++ +<]>+ +++++ .<
Brainfuck与Ook!编码——>https://www.splitbrain.org/services/ook解码网址——>GKCTF{ok_1234_admin}(Brainfuck与Ook!编程语言解析与解密
http://www.cnblogs.com/WangAoBo/p/6373318.html)
(福利:
http://ginkgo.ngrok.virzz.com:8080/login?next=challenges
http://www.360doc.com/content/16/0906/21/27425026_588911412.shtml CTF中一些脑洞大开的编码和加密
)d