Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

[Jarvis OJ]-Basic

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Https://www.jarvisoj.com/challenges Basic

-.-string

Please observe the following ciphertext and convert it into flag form.

.. -. . .. -. -. -. -. -. . . -. -. -. . -. . -. .. -. . -. -. -. -. -. . -. -.

Flag is 32-bit uppercase md5

Steps:

A good assistant for decryption: http://tool.ph0en1x.com/hashtool/tools.html#conv/FLAG522018D665387D1DA931812B77763410A Piece Of Cake

Give a passage: too long to want to cp, into the https://quipqiup.com/ word frequency analysis, lack of b, add b to have a look

Cheap hands

One day, A Jun's website was changed and the administrator's password was changed. I couldn't log on alive or dead. I went to the database to have a look. What, isn't this password md5 the same as before? Why can't you get on it?

D78b6f302l25cdc811adfe8d4e7c9fd34

Please submit PCTF {original administrator password}

Steps:

Just dump cmd5 without this md5 33rd? hexadecimal? One more person? 2l2 . . This is I (uppercase I) d78b6f30225cdc811adfe8d4e7c9fd34 dumped cmd5 to solve the hack joke.

Please submit the hexadecimal code of the "Kun jin copy". (upper case)

Character to hexadecimal

S1 copy'. Decode ('utf-8'). Encode (' gbk'). Encode ('hex')

Forensics

There is a forensics artifact, as shown in the following figure, which can analyze the TureCrypt key from the memory dump.

Steps:

Baidu memory Forensics https://www.freebuf.com/column/152545.html

Secret

The legendary signing-in question

Topic entry: http://web.jarvisoj.com:32776/

Hint1: submission format PCTF {Secrets you discover}

Steps:

Open the page to display Can you find the Secret? Look at the element and find Secret in the response header. Veryeasy

Use basic commands to get flag

1. I don't seem to have used basic orders.. Open it with Winhex, pull it to 0x1000, and get flag2. Use the basic command: strings'/ root/Desktop/veryeasy' magic face = _ =

About USS Lab. Baidu Google's full name is base64?base32 decode- > hex

After I finished it, I found the boss.

Https://bestwing.me/2016/05/26/2016-PCTF-Writup/

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report