nullcon HackIM 2016 -- Crypto Question 3
After entring the luxurious condomium,you get the feel that you are in home of a yester Star. the extravagant flooring and furnishings shows the richness of this star. But where is she? There she is, lying peacefuly on her couch. See what Envy has done to her...with a perfectly well maintained attractive body she still looks sex diva, except for her face beyond recogniton. Her identity is crucial to know who killed her and why? In absence of any personal data around there is only a file. with a cryptic text in it. Preity sure she has used her own name to XOR encrypt the file. And challenge is to know her name.
AncientSecretsOfTheKamaSutra.txt
就是找xor的密码,是电影Ancient Secrets Of The KamaSutra的一个人的名字。
把文件 AncientSecretsOfTheKamaSutra.txt 上传到 XOR Cracker(https://wiremask.eu/tools/xor-cracker/),得到了数据:
The most probable key lengths
Possible keys
Key Length | Probability | Guess Keys |
---|---|---|
2 | 11.6% | |
4 | 13.6% | |
6 | 13.1% | |
8 | 10.6% | |
12 | 15.6% | |
15 | 7.0% | |
18 | 7.9% | |
20 | 6.5% | |
24 | 8.4% | |
36 | 5.7% | |
Keys | Decrypted File | |
J $+na ine | 4a 20 24 2b 6e 61 20 03 69 6e 65 0a | |
J $+na ineK | 4a 20 24 2b 6e 61 20 03 69 6e 65 4b |
长度最有可能是12, key 可能是:J $+na ine, 然后google "Ancient Secrets of the Kama Sutra", 在 IMDB上看到了一个名字:Jeanna Fine, flag:
Jeanna Fine
nullcon HackIM 2016 -- Crypto Question 3的更多相关文章
- nullcon HackIM 2016 -- Crypto Question 1
You are in this GAME. A critical mission, and you are surrounded by the beauties, ready to shed thei ...
- nullcon HackIM 2016 -- Crypto Question 5
Now you are one step away from knowing who is that WARRIOR. The Fighter who will decide the fate of ...
- nullcon HackIM 2016 -- Crypto Question 4
He is influential, he is powerful. He is your next contact you can get you out of this situation. Yo ...
- nullcon HackIM 2016 -- Crypto Question 2
Some one was here, some one had breached the security and had infiltrated here. All the evidences ar ...
- nullcon HackIM 2016 -- Programming Question 5
Dont blink your Eyes, you might miss it. But the fatigue and exhaustion rules out any logic, any wil ...
- nullcon HackIM 2016 -- Programming Question 2
Your simple good Deeds can save you but your GREED can kill you. This has happened before. This gree ...
- nullcon HackIM 2016 -- Programming Question 1
So you reached Delhi and now the noise in your head is not allowing you to think rationally. The Nos ...
- Lodash 严重安全漏洞背后 你不得不知道的 JavaScript 知识
摘要: 详解原型污染. 原文:Lodash 严重安全漏洞背后 你不得不知道的 JavaScript 知识 作者:Lucas HC Fundebug经授权转载,版权归原作者所有. 可能有信息敏感的同学已 ...
- HDU 5793 A Boring Question (逆元+快速幂+费马小定理) ---2016杭电多校联合第六场
A Boring Question Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 65536/65536 K (Java/Others ...
随机推荐
- 获取JAVA[WEB]项目相关路径的几种方法
在jsp和class文件中调用的相对路径不同. 在jsp里,根目录是WebRoot 在class文件中,根目录是WebRoot/WEB-INF/classes 当然你也可以用System.getPro ...
- Fail2ban 防止暴力破解centos服务器的SSH或者FTP账户
次尝试登陆root账户失败的情况.[说明服务器被攻击了] logtarget = SYSLOG #我们需要做的就是把这行改成/var/log/fail2ban.log,方便用来记录日志信息 so ...
- View & draw
When an iOS application is launched, it starts a run loop. The run loop’s job is to listen for event ...
- JAVA 多线程和并发学习笔记(四)
1. 多进程 实现并发最直接的方式是在操作系统级别使用进程,进程是运行在它自己的地址空间内的自包容的程序.多任务操作系统可以通过周期性地将CPU从一个进程切换到另一个进程,来实现同时运行多个进程. 尽 ...
- 谈谈Java面向对象的三大特性
Java面向对象的三大特性就是指封装.继承.多态了. 一.封装: 概念:封装是指隐藏对象的属性和实现细节,仅对外提供公共访问方式. (举例:笔记本电脑就是一个封装体,Java语言中最小的封装体就是函数 ...
- 扩展easyui.datagrid,添加数据loading遮罩效果代码 --来自网摘收集
//jquery.datagrid 扩展 (function (){ $.extend($.fn.datagrid.methods, { //显示遮罩 loading: function(jq){ r ...
- NHibernate系列文章二十三:NHibernate查询之Criteria查询(附程序下载)
摘要 上一篇文章介绍了NHibernate HQL,他的缺点是不能够在编译时发现问题.如果数据库表结构有改动引起了实体关系映射的类有改动,要同时修改这些HQL字符串.这篇文章介绍NHibernate面 ...
- MySQL 第十天(视图、存储过程、函数、触发器)
MySql高级-视图.函数.存储过程.触发器 目录 一.视图 1 1.视图的定义 1 2.视图的作用 1 (1)可以简化查询. 1 (2)可以进行权限控制, 3 3.查询 ...
- linux top命令中各cpu占用率含义
linux top命令中各cpu占用率含义 [尊重原创文章摘自:http://www.iteye.com/topic/1137848]0.3% us 用户空间占用CPU百分比 1.0% sy 内核空间 ...
- JS验证输入网址
function CheckUrl(a) { var falg = true; var regstr = /^http(s)?:\/\/([\w-]+\.)+[\w-]+(\/[\w- . ...