下载附件,为一个压缩包

看到1,.txt和2.txt的文件大小很小,只有6个字节,尝试使用crc爆破:
使用CRC32.py进行爆破:


将两张图内的字符串组成密码字典:
s1=["1x5NQ8","9O2a5H","G1qi4N","IsCdeH","NjDZOc","OvJ7Un","P8CUk2","PT0xov","QTqIto","Rh5f6k","XBiGbJ","Z3AdV_","gsombC","mY3L6b","newctf","p7plP7","t3mmQT","vBENeA"]
s2=["17LE1V","53QD05","5Cm55e","6cfFvu","9l8GQb","BzTRNZ","EcSldq","HqVcs7","JpB1

博客讲述了通过CRC32爆破解决BMZCTF挑战的过程,涉及到使用Python脚本和字典攻击来解密压缩包,最终在文件尾部找到flag。
最低0.47元/天 解锁文章
878

被折叠的 条评论
为什么被折叠?



