• GinKgoCTF-Crypto


    一:古典密码

    一只小羊跳过了栅栏,密码如下:

    GpKlCeT_FC{rAy_pStiym}

    栅栏解密——>11栏

    二:滴滴滴

    --./-.-/-.-./-/..-./----.--/-../../-../../-../../-../../-../../-./-/./.-././.../../-./--./-----.-

    摩尔斯电码——>g k c t f [错误电码: ----.--] d i d i d i d i d i n t e r e s i n g [错误电码: -----.-]

    ——>去掉汉字空格,将所有改成大写,加上括号

    三:奇怪的flag

    这个flag格式好像是正确的,可是怎么提交不对呢?

    HLDUG{Hppe_Gps_Dszqup}

    凯撒加密爆破1~26——>GKCTFzGOOD^FOR^CRYPTO|——>修改:GKCTF{GOOD_FOR_CRYPTO}——>继续修改:GKCTF{Good_For_Crypto}

    四:贝斯

    R0tDVEZ7UmlnaHQhX0lzX2Jhc2U2NH0=

    解密网址:http://encode.chahuo.com/——>base64解密

    五:贝斯2

    data:image/png;base64,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

    Png、base64——>base转图片http://imgbase64.duoshitong.com/

    ——>

    ——>扫码发现:GKCTF{BASE64_233333333}——>(PS、ctrl+i反色)

    六:ARE YOU OK?

    +++++ +++[- >++++ ++++< ]>+++ ++++. ++++. ----- ---.< ++++[ ->+++ +<]>+
    .<+++ [->-- -<]>- ----. <++++ +++[- >++++ +++<] >++++ .<+++ [->-- -<]>-
    --.-- --.<+ ++[-> ---<] >---. <++++ ++[-> ----- -<]>- ----- ----. +.+.+
    .<+++ +++[- >++++ ++<]> +++++ ++.++ .+++. +++++ ++++. ----. +++++ .<+++
    [->++ +<]>+ +++++ .<

    Brainfuck与Ook!编码——>https://www.splitbrain.org/services/ook解码网址——>GKCTF{ok_1234_admin}(Brainfuck与Ook!编程语言解析与解密

    http://www.cnblogs.com/WangAoBo/p/6373318.html)

    (福利:

    http://ginkgo.ngrok.virzz.com:8080/login?next=challenges

    http://www.360doc.com/content/16/0906/21/27425026_588911412.shtml CTF中一些脑洞大开的编码和加密

    )d

  • 相关阅读:
    如何通过js在子页面调用父页面元素的click事件
    时间戳转换成时间格式
    sql 生成某个范围内的随机数
    Ioc思想
    【Sharepoint控件】MOSS模式化窗口
    【Sharepoint代码段】MOSS模拟超级管理员的方法
    【Sharepoint对象模型】MOSS根据模板添加子网站
    【Sharepoint控件】MOSS列表添加时SPUser字段赋值
    【C#代码段】asp在数据库加入数据
    【C#代码段】ajax从asp后台获取数据
  • 原文地址:https://www.cnblogs.com/Yuuki-/p/7868656.html
Copyright © 2020-2023  润新知