The attachments are stored in Github Release in this repository
On his first day at work, Xiaohua discovered that his important files had been encrypted, leaving only a mysterious code. Please use the mysterious code to help him decrypt it.
Submitted flag format: wdflag{xxxxx}
Operation and maintenance personnel discovered a suspicious string during network monitoring. After preliminary analysis, they suspected that the data might be encrypted using AES. In order to determine the contents of this data, they need to find the correct key.
Submitted flag format: wdflag{xxxxx}
The network of a certain unit was illegally attacked. After the security personnel investigated and collected evidence on the traffic, they saved key evidence and found that the location information of the personnel was leaked. Please analyze it. flag performs a 32-bit md5 hash value for user location information
Submitted flag format: wdflag{xxxxx}
During a routine check, Xiao Ming discovered that his computer had become extremely slow. After careful investigation, he found that there were some strange files in the system, which seemed to be encryption codes left by an attacker. After Xiao Ming cracked the code that was encrypted multiple times and tried to recover the deleted content, he carefully discovered some of the undeleted encryption codes and obtained a TXT compressed package file. He obtained important information by decrypting the TXT content.
Submitted flag format: wdflag{xxxxx}
Recently, a company's server was maliciously attacked, and the company immediately collected evidence of the traffic during the attack period in the traffic monitoring system. However, a network security intern of the company did not find the attacker's attack IP after analyzing and tracing the source, so the company decided to The task was handed back to you, who was more experienced, and upon taking over the job, you immediately investigated it in depth!
Submitted flag format: wdflag{attack IP}
A tester has just completed the development of an image encryption algorithm and would like to invite you to conduct in-depth analysis and testing.
Submitted flag format: wdflag{xxxxx}
A service port of a certain unit's server was accidentally exposed. Please debug it according to the attachment provided to test whether there is a security vulnerability.
Submitted flag format: wdflag{xxxxx}
Xiao Zhang designed a database program and claimed that his database was very safe. But after you study it carefully, you find that it is not actually safe...
Submitted flag format: wdflag{xxxxx}
Xiao Ming gave a program package. As a reverse engineer, can you reverse analyze it and find out the secrets Xiao Ming hides in it?
Submitted flag format: wdflag{xxxxx}
Once upon a time, there was a secret organization whose top secrets were stored in a string. In order to protect this string, the organization designed "four guardians", each of whom masters a kind of magic. Only by passing the numerous tests of the "Four Guardians" can the secret of this string be unlocked. How will you pass the test of the "Four Guardians" and unlock the secret of this string?
Submitted flag format: wdflag{xxxxx}