南邮的新生赛,week1
对于我这种老年痴呆来说还是能做一做。
Reverse
[Week 1] BabyBase
shift+f12 看看,base64,秒了,甚至都没换表
0xGame{N0w_y0u_kn0w_B4se64_Enc0d1ng_w3ll!}
[Week 1] BinaryMaster
flag 打开就有
0xGame{114514cc-a3a7-4e36-8db1-5f224b776271}
[Week 1] SignSign
查看字符串,打开就有
0xGame{S1gn1n_h3r3_4nd_b3g1n_Reversing_n0w}
[Week 1] Xor-Beginning
一个简单的异或
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
| v5 = [0] * 30 for i in range(len("~5\v*',3")): v5[i] = ord("~5\v*',3"[i]) v5[7] = 31 v5[8] = 118 v5[9] = 55 v5[10] = 27 v5[11] = 114 v5[12] = 49 v5[13] = 30 v5[14] = 54 v5[15] = 12 v5[16] = 76 v5[17] = 68 v5[18] = 99 v5[19] = 114 v5[20] = 87 v5[21] = 73 v5[22] = 8 v5[23] = 69 v5[24] = 66 v5[25] = 1 v5[26] = 90 v5[27] = 4 v5[28] = 19 v5[29] = 76 print(v5) flag = "" for i in range(len(v5)): flag += chr(v5[i] ^ (78 - i)) print(flag)
|
[Week 1] Xor-Endian
这题也是异或,只不过用得到一些小端序的知识,用 ChatGPT 写的,等有时间再回来研究研究
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
| import struct
v6 = [ 1363025275, 253370901, 1448151638, 1415391232, 91507463, 139743552, 1450318164, 1985283101, 1465125718, 1934953223, 84430593, 0, ]
v6_bytes = b"".join(struct.pack("<I", num) for num in v6)
v6_bytes = v6_bytes[:44]
key = b"Key0xGame2024"
encrypt_len = 44 key_len = len(key)
v7_bytes = bytearray(encrypt_len) for i in range(encrypt_len): v7_bytes[i] = v6_bytes[i] ^ key[i % key_len]
print("需要输入的字符串为:") print(v7_bytes.decode("ascii"))
|
Misc
[Week 1] 关注 DK 盾谢谢喵
签到题,不多说了
0xGame{W31c0m3_70_0x64m3_2024_5p0n50r3d_8y_dkdun}
[Week 1] 加密的压缩包?
打开之后发现文件损坏,用 bandzip
修复也没成功
伪加密修复后可以正常解压,输入解压密码 0xGame2024
拿到 flag
0xGame{M@ybe_y0u_ar2_t4e_mAsTer_0f_Z1p}
Web
[Week 1] ez_login
弱口令
[Week 1] hello_web
根据提示查看源代码
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
| <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>查看源代码</title> <script> document.addEventListener("contextmenu", function (e) { alert("居心叵测,不许查看源代码!"); e.preventDefault(); }); document.addEventListener("keydown", function (e) { if (e.key === "F12") { alert("你想干嘛?你不许F12!"); e.preventDefault(); } }); </script> </head> <body> <h1>Welcome to 0xgame 2024</h1> <p>这是一个简洁的网页,web方向的题基本都会有这么一个网站</p> <p>零基础的同学不会的地方,可以尝试多搜索一下</p> </body> </html>
|
拿到第一段
根据提示看/f14g.php
查看响应包
0xGame{ee7f2040-1987-4e0a-872d-68589c4ab3d3}
[Week 1] hello_http
考察 http 协议,用 hackerbar 打就行了,感谢哆啦 A 梦师哥的指导
0xgame{1cd6a904-725f-11ef-aafb-d4d8533ec05c}
Crypto
[Week 1] Caesar Cipher
1
| 0yHbnf{Uif_Cfhjoojoh_Pg_Dszqup}
|
凯撒密码,枚举一下
0xGame{The_Beginning_Of_Crypto}
[Week 1] Code
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
| from Crypto.Util.number import long_to_bytes from base64 import b64decode
m0 = b"0xGame{73d7" m1 = 60928972245886112747629873 m2 = "3165662d393339332d3034" m3 = b"N2YwZTdjNGRlMX0="
m1_decoded = long_to_bytes(m1) m2_decoded = bytes.fromhex(m2) m3_decoded = b64decode(m3)
flag = m0 + m1_decoded + m2_decoded + m3_decoded print(flag.decode())
|
Pwn
[Week 1] 0. test your nc
nc 连上拿到 flag,可能要连两次,第二次才有
0xGame{928bb261-0a63-4389-b629-4d1f2f449848}