nullcon HackIM 2016 -- Crypto Question 2
Some one was here, some one had breached the security and had infiltrated here. All the evidences are touched, Logs are altered, records are modified with key as a text from book.The Operation was as smooth as CAESAR had Conquested Gaul. After analysing the evidence we have some extracts of texts in a file. We need the title of the book back, but unfortunately we only have a portion of it...
The_extract.txt
Nb. Ckbkr De bkmoc kqksxcd dswo dy lvymu dro wycd nkxqobyec Sxdobxod wkvgkbo ofob mbokdon, k lydxod mkvvon AEKVXDY. Grsvo Ckbkr sc mvycon ypp sx rob mywzedob vkl, rob cscdob, Rkxxk, sc lbedkvvi kddkmuon kxn vopd sx k mywk. Kc Ckbkr boovc gsdr qesvd yfob xyd losxq drobo pyb rob cscdob, k gol yp nomozdsyx mvycoc sx, drbokdoxsxq rob kxn ofobiyxo cro vyfoc. Rkxxk’c myxnsdsyx sc wscvoknsxq. Sx rob mywk cdkdo, cro sc klvo dy lesvn k zcimrsm lbsnqo gsdr PLS Czomskv Kqoxd Tkcyx WmXosv. Rob mbizdsm wocckqoc zvkqeo Tkcyx dy uooz Ckbkr ckpo. Dyeqr kxn cdbood-cwkbd Tkcyx WmXosv nyocx’d lovsofo sx fscsyxc yb dovozkdrsm wocckqoc, kxn ro psqrdc dro fysmo sxcsno rsc rokn. Rsc psbcd swzboccsyx yp Nb. Ckbkr De sc kxydrob cdsvoddy gokbsxq smo-nbkqyx yx dro gkb zkdr―exdsv ro gsdxoccoc rob pkçkno mbewlvo kpdob coosxq rob cscdob’c lvyyni, dybdebon lyni. Tkcyx’c zbydomdsfo sxcdsxmd usmuc sx. Ro pkvvc pyb Ckbkr―rkbn. Grox kx ohdbowoxvi nkxqobyec kbwc nokvob kxn milobmbswsxkv nscmyfobc drkd Ckbkr lvymuon rsc lydxod, ro usnxzc Ckbkr. Zvkmon sx kx swzyccslvo zycsdsyx, gsvv cro nocdbyi dro lydxod dy zbydomd xkdsyxkv comebsdi yb bovokco sd dy ckfo dro wkx cro vyfoc
代码都不用写,caesar-cipher在线解密工具:
http://www.xarg.org/tools/caesar-cipher/
得到解密文本,这段文本出自“In the Shadow of Greed” 这本书,flag: In the Shadow of Greed
nullcon HackIM 2016 -- Crypto Question 2的更多相关文章
- nullcon HackIM 2016 -- Crypto Question 1
You are in this GAME. A critical mission, and you are surrounded by the beauties, ready to shed thei ...
- nullcon HackIM 2016 -- Crypto Question 5
Now you are one step away from knowing who is that WARRIOR. The Fighter who will decide the fate of ...
- nullcon HackIM 2016 -- Crypto Question 4
He is influential, he is powerful. He is your next contact you can get you out of this situation. Yo ...
- nullcon HackIM 2016 -- Crypto Question 3
After entring the luxurious condomium,you get the feel that you are in home of a yester Star. the ex ...
- nullcon HackIM 2016 -- Programming Question 5
Dont blink your Eyes, you might miss it. But the fatigue and exhaustion rules out any logic, any wil ...
- nullcon HackIM 2016 -- Programming Question 2
Your simple good Deeds can save you but your GREED can kill you. This has happened before. This gree ...
- nullcon HackIM 2016 -- Programming Question 1
So you reached Delhi and now the noise in your head is not allowing you to think rationally. The Nos ...
- Lodash 严重安全漏洞背后 你不得不知道的 JavaScript 知识
摘要: 详解原型污染. 原文:Lodash 严重安全漏洞背后 你不得不知道的 JavaScript 知识 作者:Lucas HC Fundebug经授权转载,版权归原作者所有. 可能有信息敏感的同学已 ...
- HDU 5793 A Boring Question (逆元+快速幂+费马小定理) ---2016杭电多校联合第六场
A Boring Question Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 65536/65536 K (Java/Others ...
随机推荐
- 118、通过solid来定义不同边框的颜色,可以只定义一个边框的颜色
以下是设置按钮的右边框和底边框颜色为红色,边框大小为3dp,如下图: 在drawable新建一个 buttonstyle.xml的文件,内容如下: <?xml version="1.0 ...
- boost multi_index
/** boost 多索引容器的一般使用 这里使用google 的gmock 库来验证对boost 多索引模板的使用,并验证. 这里是手敲的,可能会有一些字符敲错的情况,编译错误的放,修改一下,同时链 ...
- web.py学习心得
1.注意判断数字时,如果是get传递的参数,一定要用int转换.不然出错. 2.$var 定义时,冒号后的内容不是python内容,需加上$符号.如$var naviId:$naviId. 3.各个模 ...
- DataGridView 导出到Excel
#region 导出四个表格到Excel /// <summary> /// 导出四个表格到Excel /// </summary> /// <param name=&q ...
- CSS第二章
1. 文本与字体属性: text-decoration:文本修饰线 none(去除修饰线).underline(下划线).overline(上划线).line-through(删除线) color: ...
- sqlserver 2008 建立订阅发布时 报错 解决方案 “错误 2812” 无法创建存储过程
11月10日早上 一大早,还在地铁14号线上 ,接到同事给的信息 说我们的XX系统宕机了,本想没什么问题,一般服务器 只要硬件没有问题 重启一下就可以了, 但是事与愿违,偏偏最后检测到服务器磁盘阵列 ...
- Android 进程通信机制之 AIDL
什么是 AIDL AIDL 全称 Android Interface Definition Language,即 安卓接口描述语言.听起来很深奥,其实它的本质就是生成进程间通信接口的辅助工具.它的存在 ...
- Java的常用对象①②
Java的常用对象① Java的常用对象有很多,这里只对lang包中常用的Object,Date(Calendar,DateFormat,Math),System,Runtime进行介绍.㈠Objec ...
- Wireshark简易教程
Wireshark是世界上最流行的网络分析工具.这个强大的工具可以捕捉网络中的数据,并为用户提供关于网络和上层协议的各种信息.与很多其他网络工具一样,Wireshark也使用pcap network ...
- java技术 spring 配置
spring 的IOC是反射注入,用来管理对象的创建与销毁.一般使用都是在启动的web服务器的时候就创建了对象,可以选择自动装配对象管理,将对象引用实现与引用分开.采用的xml配置方式.及大减少了各个 ...