banner
300
1 分钟

杂项

2026年3月1日

文章摘要

该文本包含多个部分,包括代码、密钥和图像文件。其中一个部分是一个JavaScript函数`sgcc()”,该函数包含一个条件语句和一个alert函数。另一个部分是一个RSA私钥,用于加密和解密数据。还有一些图像文件和文本文件,包括一个名为“flag.txt”的文件,内容为一串数字。最后,文本中提到了一个Python脚本,用于破解一个MD5哈希值。总的来说,该文本似乎与密码学和安全相关。

bash
function sgcc(){     
if (1 == 2) {         
var flag = "\x73\x67\x63\x74\x66\x7b\x30\x36\x36\x35\x35\x36\x37\x34\x36\x62\x66\x37\x64\x63\x31\x32\x38\x35\x62\x66\x65\x66\x39\x39\x63\x66\x32\x64\x37\x30\x62\x35\x7d";         
console.log(flag);     
} else {  
       alert(/Nothing Special/);    
 } 
}

9

45

46

47

flag.txt

c=1566077545968868311749088444723100549024925747577903610033503

bash
cat id_rsa
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
-----n=1606938044309278499168642398192229212629290234347717645487123-----
-----e=65537-----%

内存镜像

Untitled.png
Untitled.png

strings

Untitled 1.png
Untitled 1.png

flag{fef13245f1f14183aa984efa079899ac}

恶意文件

Untitled 2.png
Untitled 2.png

还是od比较快准狠

文件格式分析

Untitled 3.png
Untitled 3.png

Untitled 4.png
Untitled 4.png

Untitled 5.png
Untitled 5.png

秘闻破解

bash
import string, hashlib, time
start = time.time()
comb = string.punctuation + string.digits
# ?1_1001_10_600_600_??00??7_202103301539
target = "b9fd??9d5??c1?f6c??abd????5ac??7"
import itertools
 
for i in itertools.product(comb, repeat=5):
    # print(i)
    x = '{}1_1001_10_600_600_{}{}00{}{}7_202103301539'.format(*i)
    xmd5 = hashlib.md5(x.encode()).hexdigest()
    if xmd5[:4] == 'b9fd' and xmd5[6:9] == '9d5':
        print(x, xmd5, end='/')
        break
end = time.time()
 
print('time elapsed:', end - start)

漏洞挖掘

Untitled 6.png
Untitled 6.png

Tefa sfa{50_oi_asi_Lh@82h lgi lgd00lgnps_sDBh01}

栅栏

flag{d5000_login_pass_is_DLBhh@0812}

END

相关文章

暂无相关文章

© 2026 一个普通的干饭人. All Rights Reserved. / RSS / Sitemap
Powered by Tanstack Start & Flare Stack Blog