问题

image.png
attachment-11.zip

附件信息如上,求flag

思考

Thought for a few seconds

思考

bash -lc python3 - <<'PY' flag=b'ISCC{axu036ic=mK![b<WoU2QLZ~*0wgZa$}' target=[0xc1,0x8d,0xa9,0x81,0x8f,0xd8,0xd0,0xc0,0x26,0x3c,0x6a,0x29,0xdf,0xa9,0x8c,0xc8,0x42,0xcd,0x05,0x0c,0x3f,0xe0,0x6c,0xed,0x81,0xf1,0x45,0x05,0x34,0xa5,0xd4,0xb8,0x8d,0x05,0x72,0x79] key=[0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef] def rol8(x,n): return (((x<<n)&0xff)|(x>>(8-n)))&0xff out=[] for i,c in enumerate(flag): b=(rol8(c^0x55,2)+i)&0xff b=(b^key[i&7])&0xff b=(b+0x7f)&0xff b^=((i+0x20)&0xff) out.append(b) print(len(flag), out==target) print(out) PY

Thought for 1m 29s

回答

flag 是:

text
ISCC{axu036ic=mK![b<WoU2QLZ~*0wgZa$}

校验逻辑要求长度 36,先对输入逐字节做 3 层变换,再和解密出的目标字节比较;反推后得到上面这个 flag。

分享这个问答