- 博客(5)
- 收藏
- 关注
原创 现代密码学大作业
1. Programming Assignment AESIn this assignment, you must decrypt a challenge ciphertext generated using AES in CBC-mode with PKCS #5 padding. (Note: technically this is PKCS #7 padding, since the block size of AES is 16 bytes. But the padding is done in
2022-01-08 17:28:50 1277
原创 2022西电抗疫CTF个人赛
2022西电抗疫CTF个人赛详细写了下crypto的wp,其余方向简略给出思路或脚本文章目录2022西电抗疫CTF个人赛CRYPTO1.做个核酸签个到2.Random?Secure?Algorithm?3.fight_against_covid4.AweSomeSha3!5.BOB的健康码5.1 BOB的健康码15.2 BOB的健康码25.3 BOB的健康码3MISC1-6WEB1-6PWN1-34.Collision5.scripts6.formatstringREVERSE1.the edge2.b
2022-01-07 16:25:23 3315
原创 记moectf2020新生赛 及 部分MISC题WP
目录MISC-两只企鹅MISC-Show offMISC-两只企鹅下载题目得到一张????图片,打开winhex拖到尾部发现压缩包。用winhex搜索“PK”找到压缩包头部,正好也找到了压缩包密码。分离压缩包并解压,得到flag.pyc,第一时间想到用uncompyle6到pyc反编译uncompyle6 -o flag.py flag.pyc然后运行flag.py画了另一只企鹅 (单身????HP-1flag.py最后有DES加密过的flag,只能找到密钥解密。密钥找了半天啥也找不到
2020-10-08 19:09:49 1080 2
原创 2020DASCTF七月赛-bulls**t
题目:def pairing(a,b): shell = max(a, b) step = min(a, b) if step == b: flag = 0 else: flag = 1 return shell ** 2 + step * 2 + flagdef encrypt(message): res = '' for i in range(0,len(message),2): res +=
2020-07-25 18:26:45 1715
原创 2020DASCTF七月赛-ezrsa
一道不难的RSA题目:from Crypto.Util.number import getPrime,inverse,bytes_to_long,long_to_bytesfrom sympy import isprimem = bytes_to_long(flag)i=0p=getPrime(1024)r=getPrime(1024)while True: i+=1 q = 5*p+i if isprime(q) : breakn=p*q*r
2020-07-25 18:05:16 3086
空空如也
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人