wtf

WTF is white tight feet.

  1. 1. simple xor
  2. 2. babyrsa
  3. 3. babyaes
  4. 4. 你知道js吗

simple xor

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
#include<stdio.h>
main() {
char val[] = {
0xB3, 0x91, 0x82, 0x80,
0xC3, 0x9B, 0xCE, 0x75,
0xCF, 0x9C, 0x9A, 0x85,
0x85, 0xCD, 0xB8, 0x84,
0xAA, 0x7D, 0xBD, 0xBB,
0xB1, 0xB5, 0x96, 0x71,
0x8D, 0x9E, 0x86, 0xBF,
0x73, 0xA8, 0xA3, 0x9C,
0x83, 0x65, 0x9E, 0x57,
};
char flag[0x88];
int i;
int key = 247;
for (i = 0; i <= 35; i++) {
flag[i] = (val[i] ^ key) - i;
}
printf("%s\n", flag);
}

babyrsa

1
2
3
4
5
6
7
8
9
10
11
12
13
14
from gmpy2 import *
from Crypto.Util.number import *

e = 65537
n = 27272410937497615429184017335437367466288981498585803398561456300019447702001403165885200936510173980380489828828523983388730026101865884520679872671569532101708469344562155718974222196684544003071765625134489632331414011555536130289106822732544904502428727133498239161324625698270381715640332111381465813621908465311076678337695819124178638737015840941223342176563458181918865641701282965455705790456658431641632470787689389714643528968037519265144919465402561959014798324908010947632834281698638848683632113623788303921939908168450492197671761167009855312820364427648296494571794298105543758141065915257674305081267
c = 14181751948841206148995320731138166924841307246014981115736748934451763670304308496261846056687977917728671991049712129745906089287169170294259856601300717330153987080212591008738712344004443623518040786009771108879196701679833782022875324499201475522241396314392429412747392203809125245393462952461525539673218721341853515099201642769577031724762640317081252046606564108211626446676911167979492329012381654087618979631924439276786566078856385835786995011067720124277812004808431347148593882791476391944410064371926611180496847010107167486521927340045188960373155894717498700488982910217850877130989318706580155251854

sqrt_n = iroot(n - 1, 2)[0]
print(sqrt_n)
q = next_prime(sqrt_n)
p = n // q
d = inverse(e, (p - 1) * (q - 1))
m = pow(c, d, n)
print(long_to_bytes(m))

babyaes

1
2
3
4
5
6
7
8
from Crypto.Util.number import *
from Crypto.Cipher import AES
key = b'\xa4\xa6M\xab{\xf6\x97\x94>hK\x9bBe]F'
iv = b'\xd1\xdf\x8f)\x08w\xde\xf9yX%\xca[\xcb\x18\x80'
my_aes = AES.new(key, AES.MODE_CBC, iv)
c = b'C4:\x86Q$\xb0\xd1\x1b\xa9L\x00\xad\xa3\xff\x96 hJ\x1b~\x1c\xd1y\x87A\xfe0\xe2\xfb\xc7\xb7\x7f^\xc8\x9aP\xdaX\xc6\xdf\x17l=K\x95\xd07'
flag = my_aes.decrypt(c)
print(flag)

你知道js吗

file 发现是 word 文档,然后换成其他字体,复制到 base64 解码,然后 brainfuck,然后在解码。

本文作者 : wtfff
本作品采用知识共享署名-非商业性使用-禁止演绎 4.0 国际许可协议(CC BY-NC-SA 4.0)进行许可。This blog is under a CC BY-NC-SA 4.0 Unported License
本文链接 : http://im0use.github.io/2022/05/18/Dest0g3-begin/

本文最后更新于 天前,文中所描述的信息可能已发生改变