[随波逐流]CTF Flags

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
返    回

[CyBRICS 2019]Big RAM

 广告模块
ID: 13456
标题: [CyBRICS 2019]Big RAM
描述: We heard that substitution ciphers are easy to crack with frequency analysis. Especially for English texts! This one, however, doesn’t map same letters to same letters, so it should be unbreakable. We even encrypted an entire book with it. Inside this book, we keep the flag. 得到的flag使用NSSCTF{}格式提交。
类型: 逆向
网站: NSSCTF
题目链接: https://www.nssctf.cn/problem/1170
赛事: CyBRICS
年度: 2019
Flag值:
writeup: https://ctftime.org/writeup/16039
Big RAM题目通过频率分析破解双字母替换密码,编码后的flag为xanjtou{sw_p_aqws_oefnehyh_jyiq_zw_qczoa_ybwrgzsbmu},需通过统计双字母频率与英语常见双字母频率比对完成解密。验证链接指向CTFtime官方Writeup页面,内容包含解题步骤、代码修改方案及关键信息提取过程,符合直接访问要求。
答案错误,我要更正