nullcon HackIM 2016 -- Crypto Question 2
Some one was here, some one had breached the security and had infiltrated here. All the evidences are touched, Logs are altered, records are modified with key as a text from book.The Operation was as smooth as CAESAR had Conquested Gaul. After analysing the evidence we have some extracts of texts in a file. We need the title of the book back, but unfortunately we only have a portion of it...
The_extract.txt
Nb. Ckbkr De bkmoc kqksxcd dswo dy lvymu dro wycd nkxqobyec Sxdobxod wkvgkbo ofob mbokdon, k lydxod mkvvon AEKVXDY. Grsvo Ckbkr sc mvycon ypp sx rob mywzedob vkl, rob cscdob, Rkxxk, sc lbedkvvi kddkmuon kxn vopd sx k mywk. Kc Ckbkr boovc gsdr qesvd yfob xyd losxq drobo pyb rob cscdob, k gol yp nomozdsyx mvycoc sx, drbokdoxsxq rob kxn ofobiyxo cro vyfoc. Rkxxk’c myxnsdsyx sc wscvoknsxq. Sx rob mywk cdkdo, cro sc klvo dy lesvn k zcimrsm lbsnqo gsdr PLS Czomskv Kqoxd Tkcyx WmXosv. Rob mbizdsm wocckqoc zvkqeo Tkcyx dy uooz Ckbkr ckpo. Dyeqr kxn cdbood-cwkbd Tkcyx WmXosv nyocx’d lovsofo sx fscsyxc yb dovozkdrsm wocckqoc, kxn ro psqrdc dro fysmo sxcsno rsc rokn. Rsc psbcd swzboccsyx yp Nb. Ckbkr De sc kxydrob cdsvoddy gokbsxq smo-nbkqyx yx dro gkb zkdr―exdsv ro gsdxoccoc rob pkçkno mbewlvo kpdob coosxq rob cscdob’c lvyyni, dybdebon lyni. Tkcyx’c zbydomdsfo sxcdsxmd usmuc sx. Ro pkvvc pyb Ckbkr―rkbn. Grox kx ohdbowoxvi nkxqobyec kbwc nokvob kxn milobmbswsxkv nscmyfobc drkd Ckbkr lvymuon rsc lydxod, ro usnxzc Ckbkr. Zvkmon sx kx swzyccslvo zycsdsyx, gsvv cro nocdbyi dro lydxod dy zbydomd xkdsyxkv comebsdi yb bovokco sd dy ckfo dro wkx cro vyfoc
代码都不用写,caesar-cipher在线解密工具:
http://www.xarg.org/tools/caesar-cipher/
得到解密文本,这段文本出自“In the Shadow of Greed” 这本书,flag: In the Shadow of Greed
nullcon HackIM 2016 -- Crypto Question 2的更多相关文章
- nullcon HackIM 2016 -- Crypto Question 1
You are in this GAME. A critical mission, and you are surrounded by the beauties, ready to shed thei ...
- nullcon HackIM 2016 -- Crypto Question 5
Now you are one step away from knowing who is that WARRIOR. The Fighter who will decide the fate of ...
- nullcon HackIM 2016 -- Crypto Question 4
He is influential, he is powerful. He is your next contact you can get you out of this situation. Yo ...
- nullcon HackIM 2016 -- Crypto Question 3
After entring the luxurious condomium,you get the feel that you are in home of a yester Star. the ex ...
- nullcon HackIM 2016 -- Programming Question 5
Dont blink your Eyes, you might miss it. But the fatigue and exhaustion rules out any logic, any wil ...
- nullcon HackIM 2016 -- Programming Question 2
Your simple good Deeds can save you but your GREED can kill you. This has happened before. This gree ...
- nullcon HackIM 2016 -- Programming Question 1
So you reached Delhi and now the noise in your head is not allowing you to think rationally. The Nos ...
- Lodash 严重安全漏洞背后 你不得不知道的 JavaScript 知识
摘要: 详解原型污染. 原文:Lodash 严重安全漏洞背后 你不得不知道的 JavaScript 知识 作者:Lucas HC Fundebug经授权转载,版权归原作者所有. 可能有信息敏感的同学已 ...
- HDU 5793 A Boring Question (逆元+快速幂+费马小定理) ---2016杭电多校联合第六场
A Boring Question Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 65536/65536 K (Java/Others ...
随机推荐
- 仅个人兴趣,自己通过搜索他人的成果,结合自己的理解,来分析discuz的代码。
仅个人兴趣,自己通过搜索他人的成果,结合自己的理解,来分析discuz的代码. discuz 版本: 3.2
- CM给hive添加自定义jar包
使用的是cloudera manager管理的集群: hive添加自定义jar包 服务端:高级:Hive 辅助 JAR 目录 设置的的路径是影响所有服务端的设置,比如hue中使用到了hive查询编辑器 ...
- Spring MVC基本配置@controller和@RequestMapping解释
一:配置web.xml 1)问题:spring项目中有多个配置文件mvc.xml dao.xml 2)解决:在web.xml中 <init-param> <param-name& ...
- 区分LocalStorage和偏好数据
偏好数据类似于web.config或者session,cookie之类的值,一般用于保存一些状态值,不推荐大量的数据通过此方式存储 Local Storage不仅可以寸字符串,还可以寸JSON对象
- oracle免客户端安装 plsql连接
开发的过程中,往往没有必要在自己的电脑上安装oracle,也实在太大了. 这里介绍一种使用plsql连接oracle的方法,类似于navicat之连接mysql. 先下载plsql,进行安装,这里提供 ...
- RestoreDirectory 引起的BUG
IIRC, in windows XP when you press Save on a SaveFileDialog (or Open on a OpenFileDialog) the direct ...
- 3.2 ARM指令分类学习
1 算术移位寄存器和逻辑指令 1.1 mov 传送(Move) Mov {条件} {S} <dest>, <op_1> MOV从另一个寄存器.被移位的寄存器.或者一个立即数装载 ...
- Entity framework code first
EF Code First 不便之处,数据库结构改变时,需要利用程序包管理器控制台生成代码,再用update-database -Verbose更新数据库,这样的做法在很多时候不容易部署.下面介绍一种 ...
- 高性能网络编程(一)----accept建立连接
编写服务器时,许多程序员习惯于使用高层次的组件.中间件(例如OO(面向对象)层层封装过的开源组件),相比于服务器的运行效率而言,他们更关注程序开发的效率,追求更快的完成项目功能点.希望应用代码完全不关 ...
- SNMP开发c#,高薪诚聘,或者外包开发
现在手里有一个IT资产管理方面的项目,主要会用到SNMP协议,要用这个协议进行开发,对网络上的设备进行控制, 现在高薪诚聘高手,或者项目外包合作,有意向的同学们可以联系我,时间紧迫, QQ:39011 ...