[深育杯 2021]Login
给了个加密的压缩包,010分析,其中示例 - 副本.txt是伪加密的,修改标识符
![](https://www.icode9.com/i/l/?n=22&i=blog/2627265/202207/2627265-20220707144837063-1390815478.png)
CRC32值一样,明文爆破
得到密码
![](https://www.icode9.com/i/l/?n=22&i=blog/2627265/202207/2627265-20220707145411312-1333483527.png)
解压得到password.zip
![](https://www.icode9.com/i/l/?n=22&i=blog/2627265/202207/2627265-20220707145433374-825960631.png)
6位的CRC32值爆破github.com
python CRC32.py reverse CRC32值
![](https://www.icode9.com/i/l/?n=22&i=blog/2627265/202207/2627265-20220707151805117-1505883811.png)
![](https://www.icode9.com/i/l/?n=22&i=blog/2627265/202207/2627265-20220707151848656-1357765427.png)
![](https://www.icode9.com/i/l/?n=22&i=blog/2627265/202207/2627265-20220707151925852-1688600954.png)
welc0me_sangforctf
cat password.swp
![](https://www.icode9.com/i/l/?n=22&i=blog/2627265/202207/2627265-20220707152457073-693461453.png)
标签:七月,加密,示例,010,CRC32,爆破,password,七号
来源: https://www.cnblogs.com/vuclw/p/16454839.html