ctfshow

2

image-20230823000242148

查询可知为jsfuck,相应网站解密即可

CTF在线工具-在线JSfuck加密|在线JSfuck解密|JSfuck|JSfuck原理|JSfuck算法 (hiencode.com)

image-20230823000532221

3

image-20230823002816982

还是奇奇怪怪的东西,发现有乱码,txt打开源文件,发现都是颜文字

image-20230823003008213

打开颜文字解码网站

http://hi.pcmoe.net/kaomoji.html

image-20230823003038166

4

image-20230823100001697

rsa算法

image-20230823100529390

使用rsa-tool,输入pq和e,e为16进制,所以为11

image-20230823102158371

得到d

5

image-20230823105356846

m=c^d(mod n),带入即可

image-20230823104814124

6

image-20230823105426877

在线Rabbit加密 | Rabbit解密- 在线工具 (sojson.com)

image-20230823105439040

7

image-20230823105506786

[Brainfuck/Ook! Obfuscation/Encoding splitbrain.org]

image-20230823105702995

8

image-20230823105811318

[Brainfuck/Ook! Obfuscation/Encoding splitbrain.org]

image-20230823105833477

9

打开发现是一个加密的压缩包,密码爆破

image-20230823110246204

image-20230823111014902

serpent加密,但是没找到解密网站

10

打开文件发现是下面这段字符串

=E7=94=A8=E4=BD=A0=E9=82=A3=E7=81=AB=E7=83=AD=E7=9A=84=E5=98=B4=E5=94=87=E8=AE=A9=E6=88=91=E5=9C=A8=E5=8D=88=E5=A4=9C=E9=87=8C=E6=97=A0=E5=B0=BD=E7=9A=84=E9=94=80=E9=AD=82

查找为QUOTED-PRINTABLE编码格式

http://www.metools.info/code/quotedprintable231.html

解码后

用你那火热的嘴唇让我在午夜里无尽的销魂

11

密文:a8db1d82db78ed452ba0882fb9554fc

md5解密

MD5免费在线解密破解_MD5在线加密-SOMD5

解密后

ctf

12

gmbh{ifmmp_dug}

凯撒密码

凯撒(Caesar)加密/解密 - Bugku CTF

flag{hello_ctf}

13

uozt{Zgyzhv_xlwv_uiln_xguhsld}

u-f,o-l,z-a,t-g

埃特巴什码

http://www.hiencode.com/atbash.html

flag{atbase_code_from_ctfshow}

将a改成A

flag{Atbase_code_from_ctfshow}

萌新_密码5

由田中 由田井 羊夫 由田人 由中人 羊羊 由由王 由田中 由由大 由田工 由由由 由由羊 由中大

为当铺密码

https://dsb.ink/ctf/dangpu.html

image-20230923111639774

将田改为0

image-20230923111733152

补充f和}即可

find the table

元素周期表密码

image-20230923113047999

image-20230923113306210

可得flag

babyrsa

image-20230923132738154

脚本

import sympy

e = 65537
p = 104046835712664064779194734974271185635538927889880611929931939711001301561682270177931622974642789920918902563361293345434055764293612446888383912807143394009019803471816448923969637980671221111117965227402429634935481868701166522350570364727873283332371986860194245739423508566783663380619142431820861051179
q = 140171048074107988605773731671018901813928130582422889797732071529733091703843710859282267763783461738242958098610949120354497987945911021170842457552182880133642711307227072133812253341129830416158450499258216967879857581565380890788395068130033931180395926482431150295880926480086317733457392573931410220501

n = p * q

# 计算d
phi_n = (p - 1) * (q - 1)
d = sympy.mod_inverse(e, phi_n)

print("d:", d)
c = 4772758911204771028049020670778336799568778930072841084057809867608022732611295305096052430641881550781141776498904005589873830973301898523644744951545345404578466176725030290421649344936952480254902939417215148205735730754808467351639943474816280980230447097444682489223054499524197909719857300597157406075069204315022703894466226179507627070835428226086509767746759353822302809385047763292891543697277097068406512924796409393289982738071019047393972959228919115821862868057003145401072581115989680686073663259771587445250687060240991265143919857962047718344017741878925867800431556311785625469001771370852474292194

# 解密
m = pow(c, d, n)

print("解密后的消息 m:", m)
# 解密后的消息 m

# 将整数 m 转换成字符串
message_str = ""

while m > 0:
# 从 m 中提取一个字符的 ASCII 码值
char_code = m % 256

# 将 ASCII 码值转换成字符并添加到消息字符串的开头
message_str = chr(char_code) + message_str

# 右移 8 位以处理下一个字符
m >>= 8

print("解密后的消息字符串:", message_str)

image-20230923132833331

easyrsa1

image-20230923132232002

分解n

image-20230923132148411

image-20230923132649048

脚本套入