post20190428进度 Posted on 2019-04-28 20190428进度练习了六个python编程题目,继续读python核心编程Pkcrake利用advanced zip password recovered 中plain-text模式, 在解出的Encrypted.zip文件中secrect.txt即得flag Babybase利用request和 base 对txt文件进行解码,因为不确定为base64或base32或16 ,利用脚本:123456789101112131415161718192021222324252627282930313233343536373839404142434445464748import base64import requestsdef download(url): return requests.get(url).textsteps = []url = "https://oj.blue-whale.me/files/static/uploads/bbb45d3f0b5da971903660c57ac8780f/base.txt"print "[+] Downloading encrypted file..."p = download(url)n = ""while True: # Base16 try: print "[?] using base16 deocde" n = base64.b16decode(p) print "[+] %s" % (n) steps.append(16) p = n continue except: pass # Base32 try: print "[?] using base32 deocde" n = base64.b32decode(p) print "[+] %s" % (n) steps.append(32) p = n continue except: pass # Base64 try: print "[?] using base64 deocde" n = base64.b64decode(p) print "[+] %s" % (n) steps.append(64) p = n continue except: pass breakprint "[+] flag found : %s" % (n)print "[+] steps : %s" % (steps) 解得flag