比赛地址:https://www.linkedbyx.com/
[四月赛]
MISC-6G还远吗?
断点下载,拖入010editor就能找到flag
MISC-blueshark
binwalk一下,发现7z压缩包

wireshark搜索7z(文件头),然后左上角文件→导出分组字节流,保存为xxx.7z

需要解压密码

根据提示再搜索PIN,找到密码141854,解压,flag{6da01c0a419b0b56ca8307fc9ab623eb}
RE-入门reverse
对v5进行异或处理即可

运行脚本,flag{daef_wef_reverse_sss}

RE-encrypt3
input是v15,v16数组前面已给出,v10和input异或后再和数组异或

我们挨个爆破v10(0~255),和数组异或输出,总有一个是flag

存到文档里面,ctrl+f搜索,flag{cb3521ad567c8f251fb1252d03690ce9}

CRYPTO-not_RSA
考察Paillier加密算法,套用脚本即可,flag{5785203dbe6e8fd8bdbab860f5718155}

[五月赛]
网友评论