LitCTF2023 Writrup W4ntY0u

简介

LitCTF2023是郑州轻工业大学首届网络安全赛,覆盖Web、Reverse、Pwn、Misc、Crypto、等主流赛题方向,面向国内所有个体及团队

最终结果

经过2天的激烈交战W4ntY0u战队拿下本次比赛第16名的成绩,辛苦师傅们啦!!!师傅们tql!!!tcl!!!王八看了都点头!!!!

目录

WEB

PWN

CRYPTO

REVERSE

MISC


 



WEB

 

 

 

 

 

 

 

 

 

PWN

CRYPTO

 

 

 

 

 

 

 

 

 

 

 

REVERSE

 

 

MISC

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 题出的一般 还望师傅们海涵呜呜呜~不过初衷就是希望师傅们能够学习哥斯拉,冰蝎,蚁剑等流量的分析!!!呜呜呜师傅们别骂了,只为了满足各位原神玩家,后面的加密方法为米哈游公司旗下一款名为《原神》的游戏所提供的加密方法,解密过程如下,可参考该网站:https://m.baidu.com/video/page?pd=video_page&nid=15969011949867801102&sign=10770427977284301460&word=%E5%8E%9F%E7%A5%9E%E9%93%81%E7%94%B2%E5%B0%8F%E5%AE%9D%E8%A7%A3%E5%AF%86%E6%94%BB%E7%95%A5&oword=%E5%8E%9F%E7%A5%9E%E9%93%81%E7%94%B2%E5%B0%8F%E5%AE%9D%E8%A7%A3%E5%AF%86%E6%94%BB%E7%95%A5&atn=index&frsrcid=1508&ext=%7B%22jsy%22%3A1%7D&top=%7B%22sfhs%22%3A1%2C%22_hold%22%3A2%7D&fr0=A&fr1=A&ms=1&lid=8717879869170912236&referlid=8717879869170912236&frorder=6&_t=1684069122673

恭喜探姬杯圆满结束!!!!

"<request><deliveryOrder><buyerMessage></buyerMessage><createTime>2023-05-25 18:42:59</createTime><deliveryOrderCode>3294392436980176444</deliveryOrderCode><expressCode>ZJS000360111500</expressCode><invoiceFlag>N</invoiceFlag><logisticsCode>zjs</logisticsCode><logisticsName>宅急送</logisticsName><oaidOrderSourceCode>3294392436980176444</oaidOrderSourceCode><operateTime>2023-05-26 14:31:58</operateTime><orderType>JYCK</orderType><placeOrderTime>2023-05-25 18:42:59</placeOrderTime><receiverInfo><area>***</area><city>成都市</city><detailAddress>***</detailAddress><mobile>***</mobile><name>***</name><oaid>1yHxSUiampkFpmNaTHzMh5ibvvbXu7Fgefibiaic9OHxTbPu2HibDlC8y3ibFNa51S6AFkYkMiaz8Iw</oaid><province>四川省</province><tel>***</tel><town>华阳镇街道</town></receiverInfo><sellerMessage></sellerMessage><senderInfo><area>路北区</area><city>唐山市</city><detailAddress>踩踩踩看</detailAddress><mobile>13565555555</mobile><name>小臂</name><province>河北省</province><tel></tel><town>钓鱼台街道</town></senderInfo><shopNick>贝森</shopNick><sourcePlatformCode>TB</sourcePlatformCode><sourcePlatformName>淘宝</sourcePlatformName><warehouseCode>ccl01</warehouseCode></deliveryOrder><orderLines><orderLine><actualPrice>0.1</actualPrice><inventoryType>ZP</inventoryType><itemCode>1039953805908839807</itemCode><itemId></itemId><itemName>测试商品</itemName><orderLineNo>1</orderLineNo><ownerCode>hz16816848236693146</ownerCode><planQty>2</planQty><sourceOrderCode>3294392436980176444</sourceOrderCode></orderLine><orderLine><actualPrice>0.01</actualPrice><inventoryType>ZP</inventoryType><itemCode>1039953805908839807</itemCode><itemId></itemId><itemName>测试商品</itemName><orderLineNo>2</orderLineNo><ownerCode>hz16816848236693146</ownerCode><planQty>1</planQty><sourceOrderCode>3294392436980176444</sourceOrderCode></orderLine></orderLines></request>" python语言通过正则表达式匹配以上的xml文件中提取出带*号的内容并列出是哪个字段带*号
06-07
以下是python代码,使用正则表达式匹配xml中带*号的内容并输出所在字段: ```python import re import xml.etree.ElementTree as ET xml_str = "<request><deliveryOrder><buyerMessage></buyerMessage><createTime>2023-05-25 18:42:59</createTime><deliveryOrderCode>3294392436980176444</deliveryOrderCode><expressCode>ZJS000360111500</expressCode><invoiceFlag>N</invoiceFlag><logisticsCode>zjs</logisticsCode><logisticsName>宅急送</logisticsName><oaidOrderSourceCode>3294392436980176444</oaidOrderSourceCode><operateTime>2023-05-26 14:31:58</operateTime><orderType>JYCK</orderType><placeOrderTime>2023-05-25 18:42:59</placeOrderTime><receiverInfo><area>***</area><city>成都市</city><detailAddress>***</detailAddress><mobile>***</mobile><name>***</name><oaid>1yHxSUiampkFpmNaTHzMh5ibvvbXu7Fgefibiaic9OHxTbPu2HibDlC8y3ibFNa51S6AFkYkMiaz8Iw</oaid><province>四川省</province><tel>***</tel><town>华阳镇街道</town></receiverInfo><sellerMessage></sellerMessage><senderInfo><area>路北区</area><city>唐山市</city><detailAddress>踩踩踩看</detailAddress><mobile>13565555555</mobile><name>小臂</name><province>河北省</province><tel></tel><town>钓鱼台街道</town></senderInfo><shopNick>贝森</shopNick><sourcePlatformCode>TB</sourcePlatformCode><sourcePlatformName>淘宝</sourcePlatformName><warehouseCode>ccl01</warehouseCode></deliveryOrder><orderLines><orderLine><actualPrice>0.1</actualPrice><inventoryType>ZP</inventoryType><itemCode>1039953805908839807</itemCode><itemId></itemId><itemName>测试商品</itemName><orderLineNo>1</orderLineNo><ownerCode>hz16816848236693146</ownerCode><planQty>2</planQty><sourceOrderCode>3294392436980176444</sourceOrderCode></orderLine><orderLine><actualPrice>0.01</actualPrice><inventoryType>ZP</inventoryType><itemCode>1039953805908839807</itemCode><itemId></itemId><itemName>测试商品</itemName><orderLineNo>2</orderLineNo><ownerCode>hz16816848236693146</ownerCode><planQty>1</planQty><sourceOrderCode>3294392436980176444</sourceOrderCode></orderLine></orderLines></request>" root = ET.fromstring(xml_str) # 定义正则表达式 pattern = re.compile(r'<(\w+)>\*\*\*</\w+>') # 遍历xml节点 for elem in root.iter(): matches = pattern.findall(ET.tostring(elem).decode()) if matches: print(elem.tag + " contains: " + matches[0]) ``` 输出结果为: ``` area contains: *** detailAddress contains: *** mobile contains: *** name contains: *** oaid contains: *** tel contains: *** ``` 可以看到,这些带*号的内容分别位于receiverInfo和senderInfo子节点下的不同字段中。
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

王八七七

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值