zoukankan      html  css  js  c++  java
  • 攻防世界 reverse re4-unvm-me

    re4-unvm-me alexctf-2017

    pyc文件,祭出大杀器EasyPythonDecompiler.exe

    得到源代码:

     1 # Embedded file name: unvm_me.py
     2 import md5
     3 md5s = [174282896860968005525213562254350376167L,
     4  137092044126081477479435678296496849608L,
     5  126300127609096051658061491018211963916L,
     6  314989972419727999226545215739316729360L,
     7  256525866025901597224592941642385934114L,
     8  115141138810151571209618282728408211053L,
     9  8705973470942652577929336993839061582L,
    10  256697681645515528548061291580728800189L,
    11  39818552652170274340851144295913091599L,
    12  65313561977812018046200997898904313350L,
    13  230909080238053318105407334248228870753L,
    14  196125799557195268866757688147870815374L,
    15  74874145132345503095307276614727915885L]
    16 print 'Can you turn me back to python ? ...'
    17 flag = raw_input('well as you wish.. what is the flag: ')
    18 if len(flag) > 69:
    19     print 'nice try'
    20     exit()
    21 if len(flag) % 5 != 0:
    22     print 'nice try'
    23     exit()
    24 for i in range(0, len(flag), 5):
    25     s = flag[i:i + 5]
    26     if int('0x' + md5.new(s).hexdigest(), 16) != md5s[i / 5]:
    27         print 'nice try'
    28         exit()
    29 
    30 print 'Congratz now you have the flag'

    没什么办法,在线解md5或者本地硬跑。

    幸运的是在线都可以解出来

    https://www.cmd5.com/        (有两个竟然要收费)

    https://www.somd5.com/      (所以就有了他)

    十六进制md5数据:

    831daa3c843ba8b087c895f0ed305ce7
    6722f7a07246c6af20662b855846c2c8
    5f04850fec81a27ab5fc98befa4eb40c
    ecf8dcac7503e63a6a3667c5fb94f610
    c0fd15ae2c3931bc1e140523ae934722
    569f606fd6da5d612f10cfb95c0bde6d
    068cb5a1cf54c078bf0e7e89584c1a4e
    c11e2cd82d1f9fbd7e4d6ee9581ff3bd
    1df4c637d625313720f45706a48ff20f
    3122ef3a001aaecdb8dd9d843c029e06
    adb778a0f729293e7e0b19b96a4c5a61
    938c747c6a051b3e163eb802a325148e
    38543c5e820dd9403b57beff6020596d

    解密数据:

    ALEXC
    TF{dv
    5d4s2
    vj8nk
    43s8d
    8l6m1
    n5l67
    ds9v4
    1n52n
    v37j4
    81h3d
    28n4b
    6v3k}
    ALEXCTF{dv5d4s2vj8nk43s8d8l6m1n5l67ds9v41n52nv37j481h3d28n4b6v3k}



  • 相关阅读:
    经纬度转十进制 、十进制转经纬度 、没有秒
    PowerDesigner使用
    Kafka日志存储原理
    ambari rest api (三)
    ambari rest api (修改集群配置文件)
    使用QJM构建HDFS HA架构(2.2+)
    Hadoop NameNode 高可用 (High Availability) 实现解析
    hadoop2.x Federation
    hdfs HA原理
    使用JSONObject生成和解析json
  • 原文地址:https://www.cnblogs.com/DirWang/p/11494372.html
Copyright © 2011-2022 走看看