当前位置:网站首页>CTF crypto (I) some simple encoding and encryption
CTF crypto (I) some simple encoding and encryption
2022-06-26 04:16:00 【eliforsharon】
Catalog
Base64
be used for http In the environment, the longer identification information
The basic rule
- Change every three octets into four six bytes , Add two... To each byte high order 0, Examples are as follows :
01111001 01101111 01110101
011110 010110 111101 110101
00011110 00010110 00111101 00110101
According to Base64 The alphabet gets the following characters
e W 9 1 - Every time 76 Characters plus a newline
- Handle the last Terminator
At the end of the end, you can't put together three bytes , Then take ’=' The symbol complements the four bytes that have not been completed after conversion
variant
URL improvement Base64 code , Fill at the end ’=‘ Number , And encode the ’+‘ and ’/‘ Change the number to ’-‘ and ’_’, So as to avoid URL The conversion of codec and database storage .
Regular expression improvements will ’+‘ and ’/‘ Changed to ’!‘ and ’-’
Idempotent encryption
A very simple encryption method , There are... Letters in English 26 That's why 2 Of 0、1、2、3、4 The power can express 31 A unit , The alphabetic sequence number encryption is represented by binary powers .
Such as 15 = 2 0 + 2 1 + 2 2 + 2 3 15=2^0+2^1+2^2+2^3 15=20+21+22+23, So because O This letter is on the... Of the alphabet 15 position , So it can be binary idempotent 0123 To encrypt the presentation .
Fence code
Ordinary fence
Divide plaintext passwords into N In groups , Then start with the first word of each group , Connect the words in the same position in each group , Finally form a meaningless sentence .
Such as Ilovebutdontknow Divide into 4 A group of letters
Ilov ebut dont know
Then start with the first word of each group , Connect the words in the same position in each group .
ledk lbon ouno vttw
Finally form a meaningless sentence
ledklbonounovttw
W type
The string loveuloveu When grouping, the following W Type format
I . . . u . . . e .
. o . e . l . v . u
. . v . . . o . . .
Then link it together to form the following string lueoelvuvo
Decrypt by writing code , Or decrypt the following URL http://www.atoolbox.net/Tool.php?Id=777
Bacon code
A kind of use a,b Steganography in which two letters are used instead of the other letters .
Each letter corresponds to 5 individual a , b a,b a,b A group of letters , Such as A/a - aaaaa
边栏推荐
- [Qunhui] Internet access + custom port
- 刷题记录Day01
- Judge the same value of two sets 𞓜 different values
- Computer network high frequency interview questions
- 使用Jsoup提取接口中的图片
- MySQL est livré avec l'outil de test de performance MySQL lap pour effectuer des tests de résistance
- (15) Blender source code analysis flash window display menu function
- How does virtual box virtual machine software accelerate the network speed in the virtual system?
- Redis cache data consistency solution analysis
- Capture packets (Wireshark)
猜你喜欢
User control custom DependencyProperty
钉钉开放平台-小程序开发实战(钉钉小程序服务器端)
Which is the best embedded visual programming software? (introduction, evaluation and selection of visual programming platform) [scratch, mind+, mixly]
Conditional variables for thread synchronization
win10 系统打开的软件太小,如何变大(亲测有效)
How to use EEPROM in 51 Single Chip Microcomputer?
Small record of neural network learning 71 - tensorflow2 deep learning with Google Lab
Custom parameter QR code picture combined with background picture to generate new picture node environment
[Flink] Flink source code analysis - creation of jobgraph in batch mode
The open software of win10 system is too small. How to make it larger (effective through personal test)
随机推荐
Ipvs0 network card of IPVS
[QT] resource file import
[Qunhui] command line acme SH automatically apply for domain name certificate
Nailing open platform - applet development practice (nailing applet server side)
Zhubo Huangyu: you can try these non-agricultural operation skills
(15) Blender source code analysis flash window display menu function
微软禁止俄用户下载安装Win10/11
Daily tests
What preparation should I make before learning SCM?
User control custom DependencyProperty
MySQL enable logbin in Qunhui docker
線程同步之讀寫鎖
Capture packets (Wireshark)
WPF value conversion
The stc-isp burning program for 51 single chip microcomputer always shows that "the target single chip microcomputer is being detected..." the cold start board does not respond
Upload script file (one sentence back door) WAF bypass (PHP)
捕获数据包(Wireshark)
三元损失英文版
mysql自带的性能测试工具mysqlslap执行压力测试
[Qunhui] Internet access + custom port