?密码签到



佛曰


嗷呜

- 这题很有意思,出题者卡了一个markdown语法的bug 特性

- 从兽音译者可以看到加密用去四个字符是:汪嗷呜~
- 刚好题目中~字符貌似是在markdown语法下写的,变成了删除线的形式,只要恢复再拿去解密就好了
- 呜嗷嗷嗷嗷呜啊呜呜啊呜嗷呜呜呜嗷嗷啊嗷啊呜嗷呜啊嗷呜呜嗷嗷啊嗷嗷嗷呜啊呜呜呜嗷呜呜嗷呜啊嗷啊呜嗷呜呜啊嗷呜嗷啊~呜呜啊嗷嗷嗷呜啊呜嗷嗷啊
- ~呜嗷嗷嗷嗷呜啊呜呜啊呜嗷呜呜~呜嗷嗷啊嗷啊呜嗷呜~啊~嗷~呜呜嗷嗷啊嗷嗷嗷呜啊呜呜~呜嗷呜呜~嗷~呜啊嗷啊呜嗷呜呜啊嗷呜嗷啊~呜呜啊嗷嗷嗷呜啊呜嗷嗷啊

某种加密


emoji


easy rsa





签到

兔兔把flag藏起来了

!




easy_php


头疼

- f12 查看源码
 - 审题,去观察http请求标头
 - 找到flag

好玩的贪吃蛇

- f12,发现游戏开始会向getscore.php发出请求



easy_bypass



- key1要和去掉左右无关字符的person变量相同
- key2要绕过504和504504的计数法
- key3要和pass3一样
- 于是构造如图

easy_rs


低头

easy_zip


baby_sql


0和1的故事


暴力一点





include




登陆一下




芥是啥

- 打开后是一堆东北话,找到网上关于东北话编程的教程去学习,然后把东北话变回python

- (在图里面我尝试性的添加了几个输出以更直观的发现程序的规律)
- 通过代码分析发现是隔5个字废话有一个‘那啥’

不只是base64



ifconfig


- f12看源码,没有什么,输入ifconfig会回显网络配置,盲猜是直接能运行系统命令,输入cat ifconfig.php,果然

- 于是就相当于在自己系统里找东西,输find / -name "flag"


|