实验室每日一题 2020.12.01
查看加密的压缩包,发现里面有6个3字节的文本文档,应该是3个字节的CRC32碰撞,直接上脚本:
import time
import zlib
def fuc1(str, times, len, pswdall, crcall): # 所有位置的可能字符一样
times += 1
for i in pswdall:
if times == len:
#print(str + i)
crc = zlib.crc32((str + i).encode())
if crc in crcall:
print(hex(crc)[2:], str + i)
#print(time.asctime())
else:
fuc1(str+i, times, len, pswdall, crcall)
def fuc2(str, times, len, pswdall, crcall): # 不同位置的可能字符不一样
times += 1
for i in pswdall[times-1]:
if times == len:
#print(str + i)
crc = zlib.crc32((str + i).encode())
if crc in crcall:
print(hex(crc)[2:], str + i)
#print(time.asctime())
else:
fuc2(str+i, times, len, pswdall, crcall)
print(time.asctime())
fuc1("",0,3,r" !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~",{0xea8b08f8,0x3d01a5b2,0x8aab3930,0x831d751b,0x28c5fe0e,0x5fc2ce98})
print(time.asctime())
运行后得到:
根据ASCII码转化后得到压缩包密码:Crc_32
解压后有一个二维码,扫一下发现方向不对:
转换思路,丢进linux中用zsteg查看隐写后得到flag: