虎符Crypto部分WriteUp
虎符Cubic源码
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051#!/usr/bin/env python3from math import gcdfrom functools import reducefrom fractions import Fraction as FracN = 6def read_num(prompt): try: num = int(input(prompt)) except: return 0 return num if num > 0 else 0print(f"Please give me {N} pairs of positive integers (x,y,z) " f"satisfying the equation `x/(y+z) + y/(z+x) + z/(x+y) = {N ...
红明谷杯Crypto部分WriteUp
红明谷RSA Attack源码
123456789101112131415161718192021222324252627282930313233343536from gmpy2 import *from Crypto.Util.number import *import sympyimport randomfrom secret import flagp1 = getPrime(1024)print(p1)#p1=17207120109394529415429224063180973354515455963338675823406382405343883595851554335491124997117417264960625793685762754731176017451131698440976773898124787700580215579662358746177410495179712299526621733415873684830765554397032295033998848980167216005880542215381695002259064465024759550128 ...
Hello World
Welcome to Hexo! This is your very first post. Check documentation for more info. If you get any problems when using Hexo, you can find the answer in troubleshooting or you can ask me on GitHub.
Quick StartCreate a new post1$ hexo new "My New Post"
More info: Writing
Run server1$ hexo server
More info: Server
Generate static files1$ hexo generate
More info: Generating
Deploy to remote sites1$ hexo deploy
More info: Deployment
BUUOJ Crypto
MD5
e00cf25ad42683b3df678c61f42c6bda
思路:如题,MD5
flag{admin1}
Url编码
%66%6c%61%67%7b%61%6e%64%20%31%3d%31%7d
思路:同上,如题,URL编码
flag{and 1=1}
看我回旋踢
synt{5pq1004q-86n5-46q8-o720-oro5on0417r1}
思路:回旋
flag{5cd1004d-86a5-46d8-b720-beb5ba0417e1}
一眼就解密
ZmxhZ3tUSEVfRkxBR19PRl9USElTX1NUUklOR30=
思路:base64
flag{THE_FLAG_OF_THIS_STRING}
摩丝
.. .-.. — …- . -.– — ..-
思路:摩斯密码
flag{ILOVEYOU}
变异凯撒
afZ_r9VYfScOeO_UL^RWUc
思路:有特殊符号可能是对应 ascll 码,可能是 ascll码进行移位,加上格式为 flag{}
那么a对应f,移位5;f对应l,移位6;Z对应 ...