NSCTF web200

Topic Link

http://ctf5.shiyanbar.com/web/web200.jpg

1)

NSCTF web200

分析代码可知a1zLbgQsCESEIqRLwuQAyMwLyq2L5VwBxqGA3RQAyumZ0tmMvSGM2ZwB4tws字符串经过一系列加密

2)解这道题相当于是逆过程分析

a1zLbgQsCESEIqRLwuQAyMwLyq2L5VwBxqGA3RQAyumZ0tmMvSGM2ZwB4tws

rot13 : n1mYotDfPRFRVdEYjhDNlZjYld2Y5IjOkdTN3EDNlhzM0gzZiFTZ2MjO4gjf

strrev : fjg4OjM2ZTFiZzg0MzhlNDE3NTdkOjI5Y2dlYjZlNDhjYEdVRFRPfDtoYm1n

base64 : ~88:36e1bg8438e41757d:29cgeb6e48c`GUDTO|;hbmg

3)代码逆过程

  1. <?php  
  2. $_o="~88:36e1bg8438e41757d:29cgeb6e48c`GUDTO|;hbmg";  
  3. $_="";  
  4. for($_0=0;$_0<strlen($_o);$_0++){  
  5.     $_c=substr($_o,$_0,1);  
  6.     $__=ord($_c)-1;  
  7.     $_c=chr($__);  
  8.     $_=$_.$_c;  
  9. }  
  10. $_=strrev($_);  
  11. echo $_;  
  12. ?>  
运行php文件即可得到flag