Some one was here, some one had breached the security and had infiltrated here. All the evidences are touched, Logs are altered, records are modified with key as a text from book.The Operation was as smooth as CAESAR had Conquested Gaul. After analysing the evidence we have some extracts of texts in a file. We need the title of the book back, but unfortunately we only have a portion of it...

The_extract.txt

Nb. Ckbkr De bkmoc kqksxcd dswo dy lvymu dro wycd nkxqobyec Sxdobxod wkvgkbo ofob mbokdon, k lydxod mkvvon AEKVXDY. Grsvo Ckbkr sc mvycon ypp sx rob mywzedob vkl, rob cscdob, Rkxxk, sc lbedkvvi kddkmuon kxn vopd sx k mywk. Kc Ckbkr boovc gsdr qesvd yfob xyd losxq drobo pyb rob cscdob, k gol yp nomozdsyx mvycoc sx, drbokdoxsxq rob kxn ofobiyxo cro vyfoc.

Rkxxk’c myxnsdsyx sc wscvoknsxq. Sx rob mywk cdkdo, cro sc klvo dy lesvn k zcimrsm lbsnqo gsdr PLS Czomskv Kqoxd Tkcyx WmXosv. Rob mbizdsm wocckqoc zvkqeo Tkcyx dy uooz Ckbkr ckpo.

Dyeqr kxn cdbood-cwkbd Tkcyx WmXosv nyocx’d lovsofo sx fscsyxc yb dovozkdrsm wocckqoc, kxn ro psqrdc dro fysmo sxcsno rsc rokn. Rsc psbcd swzboccsyx yp Nb. Ckbkr De sc kxydrob cdsvoddy gokbsxq smo-nbkqyx yx dro gkb zkdr―exdsv ro gsdxoccoc rob pkçkno mbewlvo kpdob coosxq rob cscdob’c lvyyni, dybdebon lyni. Tkcyx’c zbydomdsfo sxcdsxmd usmuc sx. Ro pkvvc pyb Ckbkr―rkbn. 

Grox kx ohdbowoxvi nkxqobyec kbwc nokvob kxn milobmbswsxkv nscmyfobc drkd Ckbkr lvymuon rsc lydxod, ro usnxzc Ckbkr. Zvkmon sx kx swzyccslvo zycsdsyx, gsvv cro nocdbyi dro lydxod dy zbydomd xkdsyxkv comebsdi yb bovokco sd dy ckfo dro wkx cro vyfoc

代码都不用写,caesar-cipher在线解密工具:

http://www.xarg.org/tools/caesar-cipher/

得到解密文本,这段文本出自“In the Shadow of Greed” 这本书,flag: In the Shadow of Greed

nullcon HackIM 2016 -- Crypto Question 2的更多相关文章

  1. nullcon HackIM 2016 -- Crypto Question 1

    You are in this GAME. A critical mission, and you are surrounded by the beauties, ready to shed thei ...

  2. nullcon HackIM 2016 -- Crypto Question 5

    Now you are one step away from knowing who is that WARRIOR. The Fighter who will decide the fate of ...

  3. nullcon HackIM 2016 -- Crypto Question 4

    He is influential, he is powerful. He is your next contact you can get you out of this situation. Yo ...

  4. nullcon HackIM 2016 -- Crypto Question 3

    After entring the luxurious condomium,you get the feel that you are in home of a yester Star. the ex ...

  5. nullcon HackIM 2016 -- Programming Question 5

    Dont blink your Eyes, you might miss it. But the fatigue and exhaustion rules out any logic, any wil ...

  6. nullcon HackIM 2016 -- Programming Question 2

    Your simple good Deeds can save you but your GREED can kill you. This has happened before. This gree ...

  7. nullcon HackIM 2016 -- Programming Question 1

    So you reached Delhi and now the noise in your head is not allowing you to think rationally. The Nos ...

  8. Lodash 严重安全漏洞背后 你不得不知道的 JavaScript 知识

    摘要: 详解原型污染. 原文:Lodash 严重安全漏洞背后 你不得不知道的 JavaScript 知识 作者:Lucas HC Fundebug经授权转载,版权归原作者所有. 可能有信息敏感的同学已 ...

  9. HDU 5793 A Boring Question (逆元+快速幂+费马小定理) ---2016杭电多校联合第六场

    A Boring Question Time Limit: 2000/1000 MS (Java/Others)    Memory Limit: 65536/65536 K (Java/Others ...

随机推荐

  1. 一个服务器要绑定多个HTTPS站点

    默认情况一个服务器的IIS只能绑定一个HTTPS也就是443端口 要实现多个站点对应HTTPS只能更改IIS配置 地址:C:\Windows\system32\inetsrv\config\appli ...

  2. 【菜鸟学习jquery源码】数据缓存与data()

    前言 最近比较烦,深圳的工作还没着落,论文不想弄,烦.....今天看了下jquery的数据缓存的代码,参考着Aaron的源码分析,自己有点理解了,和大家分享下.以后也打算把自己的jquery的学习心得 ...

  3. eclipse @override注解出错

    在工程中新建了一个接口,定义了一个methodA,然后写一个接口类实现该方法,并加上@override注解 项目提示@override出错,必须覆盖原方法XXX,解决办法 1)项目右键-project ...

  4. 最小安装模式下Centos7.*网卡启动配置

    最小安装模式下的Centos7.*系统默认情况下,网卡是不启动的.为了解决联网问题,自己搜集了点资料,成功连接了网络.并梳理了下处理过程. 1.首先运行ip addr命令,查看配置文件的名称.有的文章 ...

  5. [转]云计算研究必备——精典Google论文

    Google云计算技术奠定其在业界的领先地位,收集经典云计算技术公开文章供大家研究学习: 01)GFS-The Google File System 02) Bigtable - A Distribu ...

  6. linux journel

    http://www.linuxjournal.com/article/8545 http://www.linuxjournal.com/article/8093 http://www.linuxjo ...

  7. C#编辑图像文件EXIF信息

    private void setImageTag(string imgFile, string tagFile, string imgTag, string imgTitle) { ; if (Fil ...

  8. Python-6 分支 循环

    #1 循环 while 条件: 循环体 for 目标 in 表达式: 循环体   表达式可为:range(start,stop,step) break--终止当前循环,并跳出当前循环体. contin ...

  9. Samba 4 Domain Controller on Ubuntu 14.04 LTS

    1. Configure network with a static ip address $sudo nano /etc/network/interfaces auto eth0 iface eth ...

  10. Semaphore用法

    HANDLE hSemaphore; cout<<1<<endl; hSemaphore = CreateSemaphore( NULL, 0, 10000, NULL);   ...