【攻防世界017】re4-unvm-me
生活随笔
收集整理的這篇文章主要介紹了
【攻防世界017】re4-unvm-me
小編覺得挺不錯的,現在分享給大家,幫大家做個參考.
關鍵詞:md5,pyc。
這題是一個pyc文件,找一個pyc還原網站將其還原成python源碼:
#!/usr/bin/env python # visit http://tool.lu/pyc/ for more information import md5 md5s = [0x831DAA3C843BA8B087C895F0ED305CE7L,0x6722F7A07246C6AF20662B855846C2C8L,0x5F04850FEC81A27AB5FC98BEFA4EB40CL,0xECF8DCAC7503E63A6A3667C5FB94F610L,0xC0FD15AE2C3931BC1E140523AE934722L,0x569F606FD6DA5D612F10CFB95C0BDE6DL,0x68CB5A1CF54C078BF0E7E89584C1A4EL,0xC11E2CD82D1F9FBD7E4D6EE9581FF3BDL,0x1DF4C637D625313720F45706A48FF20FL,0x3122EF3A001AAECDB8DD9D843C029E06L,0xADB778A0F729293E7E0B19B96A4C5A61L,0x938C747C6A051B3E163EB802A325148EL,0x38543C5E820DD9403B57BEFF6020596DL] print 'Can you turn me back to python ? ...' flag = raw_input('well as you wish.. what is the flag: ') if len(flag) > 69:print 'nice try'exit() if len(flag) % 5 != 0:print 'nice try'exit() for i in range(0, len(flag), 5):s = flag[i:i + 5]if int('0x' + md5.new(s).hexdigest(), 16) != md5s[i / 5]:print 'nice try'exit()continue print 'Congratz now you have the flag'然后找一個md5解密網站將list里面的東西解密出來,這里推薦一個免費的網站:
https://hashes.com/zh/decrypt/hash
注意 0x68CB5A1CF54C078BF0E7E89584C1A4EL 這個,要在前面補一個0.
md5解密的內容就是key,這題一點技術含量都沒有。
md5s = ["ALEXC","TF{dv","5d4s2","vj8nk","43s8d","8l6m1","n5l67","ds9v4","1n52n","v37j4","81h3d","28n4b","6v3k}"]for s in md5s:print(s, end="")總結
以上是生活随笔為你收集整理的【攻防世界017】re4-unvm-me的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 【攻防世界016】re2-cpp-is-
- 下一篇: 【攻防世界018】Replace