黃克崴

@toxicpie9

Reading this doesn't seem like the best use of your time.

Joined on Jan 15, 2020

  • Lab 1 - Substitution Cipher 這題是類似凱薩加密的移項式密碼,會將字串 '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ_{}' 裡的每個字元同時位移。因為位移 (key) 只有 65 種可能,所以只要枚舉 key 就可以在其中一種找出答案。 :::spoiler Code chars = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ_{}' encrypted = 'iodjEv7eL6YN76HG0DSH2XJ4De4G_J0F' for key in range(len(chars)):
     Like 1 Bookmark
  • CTFtime: https://ctftime.org/event/1842 Team: ⚔️TSJ⚔️ Rank: 5 NewYearBot Here is a part of the source code: debug = request.args.get("debug") if request.method == 'POST': greetType = request.form["type"]
     Like  Bookmark
  • This is a step-by-step tutorial of my challenge Remote Code TeXecution: Hack a Discord bot that processes $\LaTeX$ files. It was originally a black-box challenge with two parts: The first part is to leak the source code, and the second part is to achieve code execution. Due to the lack of people attempting, I decided to release the source code after a few hours. The white-box version is a lot easier, and solving part 1 is no longer a dependency of solving part 2. I released the challenge a bit too late (I was fixing issues involving asyncio and concurrent requests), and it would have had more solves (even with black-box) if I had released it earlier :/. Part 1: Leaking the source Intended difficulty: Medium Guessing required: A little (black-box); None (white-box) Solve count: 1
     Like  Bookmark