Bugku:加密 进制转换

94 篇文章 2 订阅
24 篇文章 0 订阅

打开这道题,

提示了二进制,十进制等,大概率是各种转换吧。

 

d87 x65 x6c x63 o157 d109 o145 b100000 d116 b1101111 o40 x6b b1100101 b1101100 o141 d105 x62 d101 b1101001 d46 o40 d71 x69 d118 x65 x20 b1111001 o157 b1110101 d32 o141 d32 d102 o154 x61 x67 b100000 o141 d115 b100000 b1100001 d32 x67 o151 x66 d116 b101110 b100000 d32 d102 d108 d97 o147 d123 x31 b1100101 b110100 d98 d102 b111000 d49 b1100001 d54 b110011 x39 o64 o144 o145 d53 x61 b1100010 b1100011 o60 d48 o65 b1100001 x63 b110110 d101 o63 b111001 d97 d51 o70 d55 b1100010 d125 x20 b101110 x20 b1001000 d97 d118 o145 x20 d97 o40 d103 d111 d111 x64 d32 o164 b1101001 x6d o145 x7e

 

这个文本打开之后很混乱,有d,x,o,b格式,观察一下b开头的后面是类似二进制,所以o是八进制,d是十进制,x是十六进制【其实是0x开头】。

 

使用大佬的脚本将所有变成十六进制,再转化为文字。

#! /usr/bin/env python#coding=utf-8s=["d87","x65","x6c","x63","o157","d109","o145","b100000","d116","b1101111","o40","x6b","b1100101","b1101100","o141","d105","x62","d101","b1101001","d46","o40","d71","x69","d118","x65","x20","b1111001","o157","b1110101","d32","o141","d32","d102","o154","x61","x67","b100000","o141","d115","b100000","b1100001","d32","x67","o151","x66","d116","b101110","b100000","d32","d102","d108","d97","o147","d123","x31","b1100101","b110100","d98","d102","b111000","d49","b1100001","d54","b110011","x39","o64","o144","o145","d53","x61","b1100010","b1100011","o60","d48","o65","b1100001","x63","b110110","d101","o63","b111001","d97","d51","o70","d55","b1100010","d125","x20","b101110","x20","b1001000","d97","d118","o145","x20","d97","o40","d103","d111","d111","x64","d32","o164","b1101001","x6d","o145","x7e"]s1=""t=""t1=""for i in s:    s1=i    for j in range(1):        if s1[0:1]=='d':            t=str(hex(int(s1[1:])))            t=t[2:]+" "            t1=t1+t        if s1[0:1]=='x':            t=s1[1:]+" "            t1=t1+t        if s1[0:1]=='o':            t=str(hex(int(s1[1:],8)))            t=t[2:]+" "            t1=t1+t        if s1[0:1]=='b':            t=str(hex(int(s1[1:],2)))            t=t[2:]+" "            t1=t1+tprint t1

Welcome to kelaibei. Give you a flag as a gift.  flag{1e4bf81a6394de5abc005ac6e39a387b} . Have a good time~

 

完成

 

【开始营销】

想要学习CTF而没有动力?

想要在CTF领域比别人牛?

想要在网络安全信息安全方向探索而无法坚持?

欢迎关注我的微信公众号!!~~

大家一起学习,用我的毅力给与你力量!!我相信:

我思故我在。

学无止境。

 

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

酥酥糖学习

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值