2024-04-06 18:13:07 +00:00
|
|
|
|
# Crypto CTFs 技巧
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
{% hint style="success" %}
|
|
|
|
|
学习并练习 AWS 黑客技巧:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
|
|
|
学习并练习 GCP 黑客技巧:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks 培训 GCP 红队专家 (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
<details>
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
<summary>支持 HackTricks</summary>
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* 检查[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* **加入** 💬 [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**电报群组**](https://t.me/peass) 或 **关注**我们的 **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
|
|
|
* 通过向 [**HackTricks**](https://github.com/carlospolop/hacktricks) 和 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github 仓库提交 PR 来分享黑客技巧。
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
2024-07-18 18:17:52 +00:00
|
|
|
|
{% endhint %}
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
## 在线哈希数据库
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* _**谷歌搜索**_
|
|
|
|
|
* [http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240](http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240)
|
|
|
|
|
* [https://www.onlinehashcrack.com/](https://www.onlinehashcrack.com)
|
|
|
|
|
* [https://crackstation.net/](https://crackstation.net)
|
|
|
|
|
* [https://md5decrypt.net/](https://md5decrypt.net)
|
|
|
|
|
* [https://www.onlinehashcrack.com](https://www.onlinehashcrack.com)
|
|
|
|
|
* [https://gpuhash.me/](https://gpuhash.me)
|
|
|
|
|
* [https://hashes.org/search.php](https://hashes.org/search.php)
|
|
|
|
|
* [https://www.cmd5.org/](https://www.cmd5.org)
|
|
|
|
|
* [https://hashkiller.co.uk/Cracker/MD5](https://hashkiller.co.uk/Cracker/MD5)
|
|
|
|
|
* [https://www.md5online.org/md5-decrypt.html](https://www.md5online.org/md5-decrypt.html)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
## 魔术自动解密器
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* [**https://github.com/Ciphey/Ciphey**](https://github.com/Ciphey/Ciphey)
|
|
|
|
|
* [https://gchq.github.io/CyberChef/](https://gchq.github.io/CyberChef/) (魔术模块)
|
|
|
|
|
* [https://github.com/dhondta/python-codext](https://github.com/dhondta/python-codext)
|
|
|
|
|
* [https://www.boxentriq.com/code-breaking](https://www.boxentriq.com/code-breaking)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
## 编码器
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
大多数编码数据可以使用以下两个资源进行解码:
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* [https://www.dcode.fr/tools-list](https://www.dcode.fr/tools-list)
|
|
|
|
|
* [https://gchq.github.io/CyberChef/](https://gchq.github.io/CyberChef/)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
### 替换自动解密器
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* [https://www.boxentriq.com/code-breaking/cryptogram](https://www.boxentriq.com/code-breaking/cryptogram)
|
|
|
|
|
* [https://quipqiup.com/](https://quipqiup.com) - 非常好!
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
#### 凯撒密码 - ROTx 自动解密器
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* [https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript](https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
#### 阿特巴什密码
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* [http://rumkin.com/tools/cipher/atbash.php](http://rumkin.com/tools/cipher/atbash.php)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
### 基础编码自动解密器
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
使用以下链接检查所有这些基础编码:[https://github.com/dhondta/python-codext](https://github.com/dhondta/python-codext)
|
|
|
|
|
* **HAZZ15** \[_HNO4klm6ij9n+J2hyf0gzA8uvwDEq3X1Q7ZKeFrWcVTts/MRGYbdxSo=ILaUpPBC5_]
|
|
|
|
|
* `DmPsv8J7qrlKEoY7`
|
|
|
|
|
* **MEGAN35** \[_3G-Ub=c-pW-Z/12+406-9Vaq-zA-F5_]
|
|
|
|
|
* `kLD8iwKsigSalLJ5`
|
|
|
|
|
* **ZONG22** \[_ZKj9n+yf0wDVX1s/5YbdxSo=ILaUpPBCHg8uvNO4klm6iJGhQ7eFrWczAMEq3RTt2_]
|
|
|
|
|
* `ayRiIo1gpO+uUc7g`
|
|
|
|
|
* **ESAB46** \[]
|
|
|
|
|
* `3sHcL2NR8WrT7mhR`
|
|
|
|
|
* **MEGAN45** \[]
|
|
|
|
|
* `kLD8igSXm2KZlwrX`
|
|
|
|
|
* **TIGO3FX** \[]
|
|
|
|
|
* `7AP9mIzdmltYmIP9mWXX`
|
|
|
|
|
* **TRIPO5** \[]
|
|
|
|
|
* `UE9vSbnBW6psVzxB`
|
|
|
|
|
* **FERON74** \[]
|
|
|
|
|
* `PbGkNudxCzaKBm0x`
|
|
|
|
|
* **GILA7** \[]
|
|
|
|
|
* `D+nkv8C1qIKMErY1`
|
|
|
|
|
* **Citrix CTX1** \[]
|
|
|
|
|
* `MNGIKCAHMOGLKPAKMMGJKNAINPHKLOBLNNHILCBHNOHLLPBK`
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
[http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html](http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html)
|
|
|
|
|
|
|
|
|
|
### HackerizeXS \[_╫Λ↻├☰┏_]
|
|
|
|
|
```
|
|
|
|
|
╫☐↑Λ↻Λ┏Λ↻☐↑Λ
|
|
|
|
|
```
|
|
|
|
|
* [http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html](http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html)
|
|
|
|
|
|
|
|
|
|
### Morse
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
### Morse
|
2024-04-06 18:13:07 +00:00
|
|
|
|
```
|
|
|
|
|
.... --- .-.. -.-. .- .-. .- -.-. --- .-.. .-
|
|
|
|
|
```
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* [http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html](http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html) - 404 页面不存在: [https://gchq.github.io/CyberChef/](https://gchq.github.io/CyberChef/)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
### UU编码器
|
2024-04-06 18:13:07 +00:00
|
|
|
|
```
|
|
|
|
|
begin 644 webutils_pl
|
|
|
|
|
M2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(
|
|
|
|
|
M3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/
|
|
|
|
|
F3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$$`
|
|
|
|
|
`
|
|
|
|
|
end
|
|
|
|
|
```
|
|
|
|
|
* [http://www.webutils.pl/index.php?idx=uu](http://www.webutils.pl/index.php?idx=uu)
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
### XX编码器
|
2024-04-06 18:13:07 +00:00
|
|
|
|
```
|
|
|
|
|
begin 644 webutils_pl
|
|
|
|
|
hG2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236
|
|
|
|
|
5Hol-G2xAEE++
|
|
|
|
|
end
|
|
|
|
|
```
|
|
|
|
|
* [www.webutils.pl/index.php?idx=xx](https://github.com/carlospolop/hacktricks/tree/bf578e4c5a955b4f6cdbe67eb4a543e16a3f848d/crypto/www.webutils.pl/index.php?idx=xx)
|
|
|
|
|
|
|
|
|
|
### YEncoder
|
|
|
|
|
|
|
|
|
|
* [www.webutils.pl/index.php?idx=xx](https://github.com/carlospolop/hacktricks/tree/bf578e4c5a955b4f6cdbe67eb4a543e16a3f848d/crypto/www.webutils.pl/index.php?idx=xx)
|
|
|
|
|
|
|
|
|
|
### YEncoder
|
|
|
|
|
```
|
|
|
|
|
=ybegin line=128 size=28 name=webutils_pl
|
|
|
|
|
ryvkryvkryvkryvkryvkryvkryvk
|
|
|
|
|
=yend size=28 crc32=35834c86
|
|
|
|
|
```
|
|
|
|
|
* [http://www.webutils.pl/index.php?idx=yenc](http://www.webutils.pl/index.php?idx=yenc)
|
|
|
|
|
|
|
|
|
|
### BinHex
|
|
|
|
|
```
|
|
|
|
|
(This file must be converted with BinHex 4.0)
|
|
|
|
|
:#hGPBR9dD@acAh"X!$mr2cmr2cmr!!!!!!!8!!!!!-ka5%p-38K26%&)6da"5%p
|
|
|
|
|
-38K26%'d9J!!:
|
|
|
|
|
```
|
|
|
|
|
* [http://www.webutils.pl/index.php?idx=binhex](http://www.webutils.pl/index.php?idx=binhex)
|
|
|
|
|
|
|
|
|
|
### ASCII85
|
|
|
|
|
```
|
|
|
|
|
<~85DoF85DoF85DoF85DoF85DoF85DoF~>
|
|
|
|
|
```
|
|
|
|
|
* [http://www.webutils.pl/index.php?idx=ascii85](http://www.webutils.pl/index.php?idx=ascii85)
|
|
|
|
|
|
|
|
|
|
### Dvorak键盘
|
|
|
|
|
```
|
|
|
|
|
drnajapajrna
|
|
|
|
|
```
|
|
|
|
|
* [https://www.geocachingtoolbox.com/index.php?lang=en\&page=dvorakKeyboard](https://www.geocachingtoolbox.com/index.php?lang=en\&page=dvorakKeyboard)
|
|
|
|
|
|
|
|
|
|
### A1Z26
|
|
|
|
|
|
|
|
|
|
字母对应它们的数字值
|
|
|
|
|
```
|
|
|
|
|
8 15 12 1 3 1 18 1 3 15 12 1
|
|
|
|
|
```
|
|
|
|
|
### 仿射密码编码
|
|
|
|
|
|
|
|
|
|
将字母转换为数字 `(ax+b)%26`(_a_ 和 _b_ 是密钥,_x_ 是字母),然后将结果转换回字母
|
|
|
|
|
```
|
|
|
|
|
krodfdudfrod
|
|
|
|
|
```
|
|
|
|
|
### 短信代码
|
|
|
|
|
|
|
|
|
|
**Multitap** [通过在移动电话键盘上定义的相应键代码重复数字来替换字母](https://www.dcode.fr/word-letter-change)(在编写短信时使用此模式)。\
|
|
|
|
|
例如:2=A, 22=B, 222=C, 3=D...\
|
|
|
|
|
您可以识别此代码,因为您会看到**多个重复的数字**。
|
|
|
|
|
|
|
|
|
|
您可以在以下链接中解码此代码:[https://www.dcode.fr/multitap-abc-cipher](https://www.dcode.fr/multitap-abc-cipher)
|
|
|
|
|
|
|
|
|
|
### 培根密码
|
|
|
|
|
|
|
|
|
|
将每个字母替换为4个A或B(或1和0)。
|
|
|
|
|
```
|
|
|
|
|
00111 01101 01010 00000 00010 00000 10000 00000 00010 01101 01010 00000
|
|
|
|
|
AABBB ABBAB ABABA AAAAA AAABA AAAAA BAAAA AAAAA AAABA ABBAB ABABA AAAAA
|
|
|
|
|
```
|
|
|
|
|
### 符文
|
|
|
|
|
|
|
|
|
|
![](../.gitbook/assets/runes.jpg)
|
|
|
|
|
|
|
|
|
|
## 压缩
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
**原始压缩** 和 **原始解压**(你可以在 Cyberchef 中找到)可以压缩和解压数据而不包含头部信息。
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
## 简单加密
|
|
|
|
|
|
|
|
|
|
### 异或 - 自动解密器
|
|
|
|
|
|
|
|
|
|
* [https://wiremask.eu/tools/xor-cracker/](https://wiremask.eu/tools/xor-cracker/)
|
|
|
|
|
|
|
|
|
|
### Bifid
|
|
|
|
|
|
|
|
|
|
需要关键词
|
|
|
|
|
```
|
|
|
|
|
fgaargaamnlunesuneoa
|
|
|
|
|
```
|
|
|
|
|
### 维吉尼亚密码
|
|
|
|
|
|
|
|
|
|
需要一个关键词
|
|
|
|
|
```
|
|
|
|
|
wodsyoidrods
|
|
|
|
|
```
|
|
|
|
|
* [https://www.guballa.de/vigenere-solver](https://www.guballa.de/vigenere-solver)
|
|
|
|
|
* [https://www.dcode.fr/vigenere-cipher](https://www.dcode.fr/vigenere-cipher)
|
|
|
|
|
* [https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx](https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx)
|
|
|
|
|
|
|
|
|
|
## 强加密
|
|
|
|
|
|
|
|
|
|
### Fernet
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
2个base64字符串(token和key)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
```
|
|
|
|
|
Token:
|
|
|
|
|
gAAAAABWC9P7-9RsxTz_dwxh9-O2VUB7Ih8UCQL1_Zk4suxnkCvb26Ie4i8HSUJ4caHZuiNtjLl3qfmCv_fS3_VpjL7HxCz7_Q==
|
|
|
|
|
|
|
|
|
|
Key:
|
|
|
|
|
-s6eI5hyNh8liH7Gq0urPC-vzPgNnxauKvRO4g03oYI=
|
|
|
|
|
```
|
|
|
|
|
* [https://asecuritysite.com/encryption/ferdecode](https://asecuritysite.com/encryption/ferdecode)
|
|
|
|
|
|
|
|
|
|
### Samir 秘密分享
|
|
|
|
|
|
|
|
|
|
一个秘密被分成 X 部分,要恢复它,你需要 Y 部分(_Y <=X_)。
|
|
|
|
|
```
|
|
|
|
|
8019f8fa5879aa3e07858d08308dc1a8b45
|
|
|
|
|
80223035713295bddf0b0bd1b10a5340b89
|
|
|
|
|
803bc8cf294b3f83d88e86d9818792e80cd
|
|
|
|
|
```
|
|
|
|
|
[http://christian.gen.co/secrets/](http://christian.gen.co/secrets/)
|
|
|
|
|
|
|
|
|
|
### OpenSSL暴力破解
|
|
|
|
|
|
|
|
|
|
* [https://github.com/glv2/bruteforce-salted-openssl](https://github.com/glv2/bruteforce-salted-openssl)
|
|
|
|
|
* [https://github.com/carlospolop/easy\_BFopensslCTF](https://github.com/carlospolop/easy\_BFopensslCTF)
|
|
|
|
|
|
|
|
|
|
## 工具
|
|
|
|
|
|
|
|
|
|
* [https://github.com/Ganapati/RsaCtfTool](https://github.com/Ganapati/RsaCtfTool)
|
|
|
|
|
* [https://github.com/lockedbyte/cryptovenom](https://github.com/lockedbyte/cryptovenom)
|
|
|
|
|
* [https://github.com/nccgroup/featherduster](https://github.com/nccgroup/featherduster)
|
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
{% hint style="success" %}
|
|
|
|
|
学习并练习AWS黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks培训AWS红队专家(ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
|
|
|
学习并练习GCP黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks培训GCP红队专家(GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
<details>
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
<summary>支持HackTricks</summary>
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
2024-07-18 18:17:52 +00:00
|
|
|
|
* 查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* **加入** 💬 [**Discord群组**](https://discord.gg/hRep4RUj7f) 或 [**电报群组**](https://t.me/peass) 或 **关注**我们的**Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
|
|
|
* 通过向[**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github仓库提交PR来分享黑客技巧。
|
2024-04-06 18:13:07 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
2024-07-18 18:17:52 +00:00
|
|
|
|
{% endhint %}
|