BUUCTF clocks in every day on July 24, 2021

introduction Typhoon day, also practiced a day's car, Gan [SUCTF2019]MT To fill the hole First look at the encryption code: from Crypto.Util import number from flag import flag def convert(m): m = m ^ m >> 13 m = m ^ m << 9 & 2029229568 m = m ^ m << 17 & 2245263360 m = m ^ m >> 19 return ...

Posted by Nic on Fri, 14 Jan 2022 08:55:18 +0100

Packet capture analysis and application of 91 short video encryption algorithm

Target APP: 91 short videoI posted an article before Ant accelerator brush invitation According to the article, this APP is basically the same as the encryption algorithm of ant accelerator. It is not available for download.0x00 tool preparationFiddler (agent capture)Xposed (hook framework)Inspeckage (universal hook plug-in, optional) Algorithm ...

Posted by Magicman0022 on Mon, 10 Jan 2022 03:03:36 +0100

Packet capture analysis and application of 91 short video encryption algorithm

Target APP: 91 short videoI posted an article before Ant accelerator brush invitation According to the article, this APP is basically the same as the encryption algorithm of ant accelerator. It is not available for download.0x00 tool preparationFiddler (agent capture)Xposed (hook framework)Inspeckage (universal hook plug-in, optional) Algorithm ...

Posted by dfowler on Sat, 08 Jan 2022 09:26:57 +0100

Canokey Getting Started Guide: F2A, OpenPGP, PIV

Canokeys F2A Canokey uses Yubikey Authenticator to manage F2A. Download Yubikey Authenticator. The following is the official download website of Yubikey Authenticator https://www.yubico.com/products/yubico-authenticator/#h-download-yubico-authenticator Run Yubikey Authenticator Enter the custom reader and fill in the CanoKey in the custo ...

Posted by juminoz on Wed, 05 Jan 2022 18:00:20 +0100

Use Jasypt to encrypt the application s of the SpringBoot project

Use Jasypt to encrypt the application s of the SpringBoot project This article focuses on why to encrypt sensitive information in SpringBoot's application, how to use jasypt spring boot project to encrypt application * and suggestions on encryption strategies. Record some experience of application encryption. What's in the application To ...

Posted by frist44 on Wed, 05 Jan 2022 13:19:34 +0100

A joint encryption solution using RSA asymmetric encryption and AES symmetric encryption and process recovery

        With the development of the Internet environment, a series of security problems caused by network security problems will lead to the disclosure of trade secrets, economic losses of enterprises / individuals, and even cyber crime, or endanger national security.         In the current development ...

Posted by immunity on Wed, 08 Dec 2021 09:59:28 +0100