题目描述:
一道简单的nc题!!!来点pwn_re震撼~
nc连接一下,发现提示"xor",并给出一串十六进制字符
0x44,0x7c,0x5e,0x44,0x41,0x21,0x42,0x57,0x75,0x21,0x74,0x56,0x44,0x57,0x5d,0x67,0x44,0x46,0x29,0x45,0x5d,0x56,0x29,0x67,0x46,0x22,0x25,0x76,0x74,0x6a,0x52,0x69,0x5d,0x47,0x41,0x78,0x76,0x41,0x2d,0x2d

enc=[0x44, 0x7c, 0x5e, 0x44, 0x41, 0x21, 0x42, 0x57, 0x75, 0x21, 0x74, 0x56, 0x44, 0x57, 0x5d, 0x67, 0x44, 0x46, 0x29, 0x45, 0x5d, 0x56, 0x29, 0x67, 0x46, 0x22, 0x25, 0x76, 0x74, 0x6a, 0x52, 0x69, 0x5d, 0x47, 0x41, 0x78, 0x76, 0x41, 0x2d, 0x2d]
for i in range(len(enc)):
print(chr(enc[i]^16),end="")
用脚本异或一下 ,得到一串base64密文TlNTQ1RGe1dFTGMwTV9UMF9wV25fdzByMW

本文介绍了解一道网络安全竞赛中的题目,涉及nc连接、XOR加密、十六进制转Base64的解密过程,最终揭示出NSSCTF比赛的flag。
最低0.47元/天 解锁文章
744

被折叠的 条评论
为什么被折叠?



