1
0

feat: 实现多个挑战并改进测试

- 重写p1实现纯Rust的hex到base64转换
- 完成p13 ECB剪切粘贴攻击和破解脚本
- 实现p33 Diffie-Hellman密钥交换算法
- 修复p9的PKCS#7测试用例
- 在common库添加gen_random_key和pkcs7_unpadding函数
- 更新workspace依赖管理
This commit is contained in:
2025-08-01 16:00:16 +08:00
parent 23d016407c
commit e400b87e9f
17 changed files with 664 additions and 68 deletions

View File

@@ -4,5 +4,4 @@ version = "0.1.0"
edition = "2024"
[dependencies]
hex = { workspace = true }
base64 = { workspace = true }
anyhow = { workspace = true }

View File

@@ -1,13 +1,106 @@
use base64::{Engine as _, engine::general_purpose::STANDARD};
use anyhow::{Ok, Result, anyhow};
fn hex_to_base64(hex_str: &str) -> String {
let bytes = hex::decode(hex_str).expect("解码失败");
STANDARD.encode(&bytes)
const BASE_TABLE: [char; 64] = [
'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S',
'T', 'U', 'V', 'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l',
'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z', '0', '1', '2', '3', '4',
'5', '6', '7', '8', '9', '+', '/',
];
fn hex_to_base64(hex_str: &str) -> Result<String> {
if hex_str.is_empty() {
return Ok("".to_string());
}
let mut hex_str = hex_str.to_lowercase();
if hex_str.len() % 2 == 1 {
hex_str.insert(0, '0');
}
let mut hex_bytes: Vec<u8> = Vec::new();
let mut result = String::new();
for i in hex_str.as_bytes().chunks(2) {
let high = match i[0] {
b'0'..=b'9' => i[0] - b'0',
b'a'..=b'f' => i[0] - b'a' + 10,
b'A'..=b'F' => i[0] - b'A' + 10,
_ => return Err(anyhow!("Invalid hex character: {}", i[0] as char)),
};
let low = match i[1] {
b'0'..=b'9' => i[1] - b'0',
b'a'..=b'f' => i[1] - b'a' + 10,
b'A'..=b'F' => i[1] - b'A' + 10,
_ => return Err(anyhow!("Invalid hex character: {}", i[0] as char)),
};
hex_bytes.push(high << 4 | low);
}
for base_bytes in hex_bytes.chunks(3) {
match base_bytes.len() {
1 => {
let index_1 = base_bytes[0] >> 2 & 0x3F;
let index_2 = (base_bytes[0] & 0x03) << 4;
result.push(BASE_TABLE[index_1 as usize]);
result.push(BASE_TABLE[index_2 as usize]);
result.push('=');
result.push('=');
}
2 => {
let index_1 = base_bytes[0] >> 2 & 0x3F;
let index_2 = (base_bytes[0] & 0x03) << 4 | (base_bytes[1] >> 4) & 0x0f;
let index_3 = (base_bytes[1] & 0x0F) << 2;
result.push(BASE_TABLE[index_1 as usize]);
result.push(BASE_TABLE[index_2 as usize]);
result.push(BASE_TABLE[index_3 as usize]);
result.push('=');
}
3 => {
let index_1 = base_bytes[0] >> 2 & 0x3F;
let index_2 = (base_bytes[0] & 0x03) << 4 | (base_bytes[1] >> 4) & 0x0f;
let index_3 = (base_bytes[1] & 0x0F) << 2 | (base_bytes[2] >> 6) & 0x03;
let index_4 = base_bytes[2] & 0x3F;
result.push(BASE_TABLE[index_1 as usize]);
result.push(BASE_TABLE[index_2 as usize]);
result.push(BASE_TABLE[index_3 as usize]);
result.push(BASE_TABLE[index_4 as usize]);
}
_ => {}
}
}
Ok(result)
}
fn main() {
fn main() -> Result<()> {
// 从十六进制字符串解码为原始字节
let hex_str = "49276d206b696c6c696e6720796f757220627261696e206c696b65206120706f69736f6e6f7573206d757368726f6f6d";
let base64_str = hex_to_base64(hex_str);
let base64_str = hex_to_base64(hex_str)?;
println!("十六进制字符串: {base64_str}");
Ok(())
}
#[cfg(test)]
mod tests {
use super::*; // 导入上层的函数
#[test]
fn test_hex_to_base64_empty() {
let hex_str = "";
let expected_base64 = "";
assert_eq!(hex_to_base64(hex_str).unwrap(), expected_base64);
}
#[test]
fn test_hex_to_base64_single_byte() {
let hex_str = "4a";
let expected_base64 = "Sg==";
assert_eq!(hex_to_base64(hex_str).unwrap(), expected_base64);
}
#[test]
fn test_hex_to_base64_all_bytes() {
let hex_str = "000102ff";
let expected_base64 = "AAEC/w==";
assert_eq!(hex_to_base64(hex_str).unwrap(), expected_base64);
}
}

View File

@@ -1,13 +1,6 @@
use common::{aes_cbc_enc, aes_ecb_enc, is_ecb, pkcs7_padding};
use common::{aes_cbc_enc, aes_ecb_enc, gen_random_key, is_ecb, pkcs7_padding};
use rand::prelude::*;
fn gen_random_key() -> [u8; 16] {
let mut rng = rand::rng();
let mut key = [0u8; 16];
rng.fill(&mut key);
key
}
fn encryption_oracle(plaintext: &[u8]) -> Vec<u8> {
let key = gen_random_key();
let mut rng = rand::rng();

View File

@@ -2,15 +2,7 @@ use std::process::exit;
use anyhow::Result;
use base64::{Engine, engine::general_purpose::STANDARD};
use common::{aes_ecb_enc, pkcs7_padding};
use rand::{prelude::*, rand_core::block};
fn gen_random_key() -> [u8; 16] {
let mut rng = rand::rng();
let mut key = [0u8; 16];
rng.fill(&mut key);
key
}
use common::{aes_ecb_enc, gen_random_key, pkcs7_padding};
fn oracle(controlled_input: &[u8], key: &[u8; 16], unknown_string: &[u8]) -> Vec<u8> {
let mut data = Vec::new();

View File

@@ -4,3 +4,5 @@ version = "0.1.0"
edition = "2024"
[dependencies]
common = { path = "../../common" }
hex = { workspace = true }

42
problems/p13/crack.py Normal file
View File

@@ -0,0 +1,42 @@
from pwn import *
# context.log_level = "debug"
p = process("../../target/x86_64-unknown-linux-musl/debug/p13")
p.recvuntil(b"> ") # 等待提示符
p.sendline(b"1")
p.recvuntil(b"email: ")
p.sendline(b"foo@bar.com12")
cipher = p.recvline().strip()
print(f"Cipher: {cipher}")
role_cipher = cipher[32:64]
p.sendline(b"1")
p.recvuntil(b"email: ")
p.sendline(b"foo@bar.co" + b"admin" + b"\x0b" * 11)
cipher = p.recvline().strip()
# admin_cipher = cipher[32:64]
print(f"Cipher: {cipher}")
cracked_cipher = cipher[0:32] + role_cipher + cipher[32:]
p.recvuntil(b"> ")
p.sendline(b"2")
p.recvuntil(b"cipher: ")
p.sendline(cracked_cipher)
profile = p.recvline().strip()
print(f"Profile: {profile}")
json = p.recvline().strip()
print(f"Json: {json}")
if b"Cracked!" in json:
print("Success!")
p.recvuntil(b"> ")
# p.interactive()

View File

@@ -1,3 +1,130 @@
fn main() {
println!("Hello, world!");
use common::{aes_ecb_dec, aes_ecb_enc, gen_random_key, pkcs7_padding, pkcs7_unpadding};
use std::fmt::Write as FmtWrite;
use std::io::Write as IoWrite;
use std::io::{stdin, stdout};
fn kv_to_json(input: &str) -> String {
let mut json = String::new();
if input.is_empty() {
return json;
}
json.push('{');
for kv in input.split('&') {
if let Some((key, value)) = kv.split_once('=') {
if value.contains('=') {
todo!("Ignore here");
}
if json.contains(key) {
todo!("Ignore here")
}
match value.parse::<i32>() {
Ok(num) => write!(json, "{key}: {num}, ").unwrap(),
Err(_) => write!(json, "{key}: \'{value}\', ").unwrap(),
}
}
}
json.pop();
json.pop();
json.push('}');
json
}
/// Generates a user profile string from an email address.
///
/// # Example
/// ```
/// let profile = profile_for("foo@bar.com");
/// assert_eq!(profile, "email=foo@bar.com&uid=10&role=user");
/// ```
fn profile_for(email: &str) -> String {
let email = email.replace(['=', '&'], "");
format!("email={email}&uid=10&role=user")
}
fn enc_profile(profile: &str, key: &[u8; 16]) -> Vec<u8> {
let mut profile = profile.as_bytes().to_vec();
pkcs7_padding(&mut profile, 16);
aes_ecb_enc(&profile, key).unwrap()
}
fn dec_profile(cipher: &[u8], key: &[u8; 16]) -> Vec<u8> {
let profile = aes_ecb_dec(cipher, key).unwrap();
pkcs7_unpadding(&profile).unwrap()
}
fn main() {
let key = gen_random_key();
println!("input 1 for enc, input 2 for dec");
loop {
print!("> ");
stdout().flush().unwrap(); // 强制刷新输出缓冲区
let mut option = String::new();
stdin().read_line(&mut option).unwrap();
let option = option.trim().parse::<i32>();
match option {
Ok(1) => {
print!("email: ");
stdout().flush().unwrap();
let mut email = String::new();
stdin().read_line(&mut email).unwrap();
let email = email.trim();
let profile = profile_for(email);
let cipher = enc_profile(&profile, &key);
for i in cipher {
print!("{i:02x}");
}
println!();
}
Ok(2) => {
print!("cipher: ");
stdout().flush().unwrap();
let mut cipher = String::new();
stdin().read_line(&mut cipher).unwrap();
let cipher = match hex::decode(cipher.trim()) {
Ok(bytes) => bytes,
Err(_) => {
println!("invalid cipher");
continue;
}
};
let profile = String::from_utf8(dec_profile(&cipher, &key)).unwrap();
println!("{profile}");
let json = kv_to_json(&profile);
if json.contains("role: 'admin'") {
println!("Cracked!");
} else {
println!("{json}");
}
}
_ => {
println!("input 1 for enc, input 2 for dec");
continue;
}
}
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_kv_to_json() {
let test = kv_to_json("foo=bar&baz=qux&zap=zazzle");
println!("{test}");
let test = kv_to_json("foo=bar&baz=qux&zap=123");
println!("{test}");
let test = kv_to_json("foo=bar&baz=qux&zap=123a");
println!("{test}");
}
#[test]
fn test_profile_for() {
let test = profile_for("1@2");
println!("u{test}");
}
}

View File

@@ -20,6 +20,6 @@ fn main() -> Result<(), String> {
// 将结果转换为十六进制字符串
let hex_result = hex::encode(&xor_string);
println!("{}", hex_result);
println!("{hex_result}");
Ok(())
}

View File

@@ -11,7 +11,7 @@ fn main() {
if let Ok(text) = std::str::from_utf8(&plaintext) {
// 只有当转换成功时才调用is_valid_english
if is_valid_english(text, None) {
println!("Found valid sentence with key {}: {}", key, text);
println!("Found valid sentence with key {key}: {text}");
}
}
}

11
problems/p33/Cargo.toml Normal file
View File

@@ -0,0 +1,11 @@
[package]
name = "p33"
version = "0.1.0"
edition = "2024"
[dependencies]
num-bigint = { workspace = true }
num-traits = { workspace = true }
rand = { workspace = true }
anyhow = { workspace = true }
once_cell = { workspace = true }

209
problems/p33/src/main.rs Normal file
View File

@@ -0,0 +1,209 @@
use anyhow::{Ok, Result, anyhow};
use num_bigint::{BigUint, RandBigInt};
use num_traits::{One, Zero};
use once_cell::sync::Lazy;
use rand::thread_rng;
static NIST_P: Lazy<BigUint> = Lazy::new(|| {
BigUint::parse_bytes(b"ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74020bbea63b139b22514a08798e3404ddef9519b3cd3a431b302b0a6df25f14374fe1356d6d51c245e485b576625e7ec6f44c42e9a637ed6b0bff5cb6f406b7edee386bfb5a899fa5ae9f24117c4b1fe649286651ece45b3dc2007cb8a163bf0598da48361c55d39a69163fa8fd24cf5f83655d23dca3ad961c62f356208552bb9ed529077096966d670c354e4abc9804f1746c08ca237327ffffffffffffffff",16).unwrap()
});
static NIST_G: Lazy<BigUint> = Lazy::new(|| BigUint::from(2u8));
fn mod_exp(base: &BigUint, exp: &BigUint, modulus: &BigUint) -> Result<BigUint> {
if modulus.is_zero() {
return Err(anyhow!("modulus should greater than 0"));
}
let mut base = base % modulus;
if exp.is_zero() {
return Ok(BigUint::one());
}
if base.is_zero() {
return Ok(base);
}
let mut result = BigUint::one();
let mut exp = exp.clone();
while !exp.is_zero() {
if exp.bit(0) {
result = (&result * &base) % modulus;
}
base = (&base * &base) % modulus;
exp >>= 1;
}
Ok(result)
}
type PublicKey = BigUint;
type PrivateKey = BigUint;
fn gen_dh_keypair() -> Result<(PrivateKey, PublicKey)> {
let mut rng = thread_rng();
let private_key = rng.gen_biguint_range(&BigUint::zero(), &NIST_P);
let public_key = mod_exp(&NIST_G, &private_key, &NIST_P)?;
Ok((private_key, public_key))
}
fn gen_secret(public_key: &BigUint, privite_key: &BigUint) -> Result<BigUint> {
mod_exp(public_key, privite_key, &NIST_P)
}
fn main() -> Result<()> {
let (sk_alice, pk_alice) = gen_dh_keypair()?;
let (sk_bob, pk_bob) = gen_dh_keypair()?;
let secret_alice = gen_secret(&pk_bob, &sk_alice)?;
let secret_bob = gen_secret(&pk_alice, &sk_bob)?;
if secret_alice == secret_bob {
println!("We share the same secret");
} else {
println!("Secret incorrect");
}
Ok(())
}
#[cfg(test)]
mod tests {
use super::*;
use num_bigint::BigUint;
use num_traits::{One, Zero};
#[test]
fn test_basic_modexp() {
// 3^4 mod 5 = 81 mod 5 = 1
let result = mod_exp(
&BigUint::from(3u32),
&BigUint::from(4u32),
&BigUint::from(5u32),
)
.unwrap();
assert_eq!(result, BigUint::from(1u32));
}
#[test]
fn test_large_numbers() {
// 2^100 mod 17
let result = mod_exp(
&BigUint::from(2u32),
&BigUint::from(100u32),
&BigUint::from(17u32),
)
.unwrap();
// 2^100 mod 17 = 16 (can verify with smaller calculation)
assert_eq!(result, BigUint::from(16u32));
}
#[test]
fn test_zero_exponent() {
// Any number^0 mod m = 1 (except 0^0)
let result = mod_exp(
&BigUint::from(123u32),
&BigUint::zero(),
&BigUint::from(456u32),
)
.unwrap();
assert_eq!(result, BigUint::one());
}
#[test]
fn test_zero_base() {
// 0^n mod m = 0 (for n > 0)
let result = mod_exp(&BigUint::zero(), &BigUint::from(5u32), &BigUint::from(7u32)).unwrap();
assert_eq!(result, BigUint::zero());
}
#[test]
fn test_one_base() {
// 1^n mod m = 1
let result = mod_exp(
&BigUint::one(),
&BigUint::from(999u32),
&BigUint::from(123u32),
)
.unwrap();
assert_eq!(result, BigUint::one());
}
#[test]
fn test_modulus_one() {
// Any number mod 1 = 0
let result = mod_exp(
&BigUint::from(123u32),
&BigUint::from(456u32),
&BigUint::one(),
)
.unwrap();
assert_eq!(result, BigUint::zero());
}
#[test]
fn test_rsa_example() {
// RSA-like calculation: 42^17 mod 77
let result = mod_exp(
&BigUint::from(42u32),
&BigUint::from(17u32),
&BigUint::from(77u32),
)
.unwrap();
// Can verify this manually or with known RSA test vectors
assert_eq!(result, BigUint::from(70u32));
}
#[test]
fn test_fermat_little_theorem() {
// p = 7 (prime), a = 3
// 3^6 mod 7 should equal 1 (Fermat's Little Theorem: a^(p-1) ≡ 1 mod p)
let result = mod_exp(
&BigUint::from(3u32),
&BigUint::from(6u32),
&BigUint::from(7u32),
)
.unwrap();
assert_eq!(result, BigUint::one());
}
#[test]
fn test_very_large_numbers() {
// Test with very large numbers
let base = BigUint::parse_bytes(b"123456789012345678901234567890", 10).unwrap();
let exp = BigUint::from(1000u32);
let modulus = BigUint::parse_bytes(b"987654321098765432109876543210987654321", 10).unwrap();
let result = mod_exp(&base, &exp, &modulus);
assert!(result.is_ok());
// Result should be less than modulus
assert!(
result.unwrap()
< BigUint::parse_bytes(b"987654321098765432109876543210987654321", 10).unwrap()
);
}
#[test]
fn test_error_zero_modulus() {
// Division by zero should return error
let result = mod_exp(&BigUint::from(5u32), &BigUint::from(3u32), &BigUint::zero());
assert!(result.is_err());
}
#[test]
fn test_zero_zero_case() {
// 0^0 is mathematically undefined, should handle appropriately
let result = mod_exp(&BigUint::zero(), &BigUint::zero(), &BigUint::from(5u32));
// Depending on your implementation, this might return 1 or error
// Common convention is 0^0 = 1 in many contexts
assert!(result.is_ok() || result.is_err()); // Just ensure it's handled
}
#[test]
fn test_equal_base_modulus() {
// base == modulus, so base mod modulus = 0
// 0^exp mod modulus = 0 (for exp > 0)
let result = mod_exp(
&BigUint::from(7u32),
&BigUint::from(3u32),
&BigUint::from(7u32),
)
.unwrap();
assert_eq!(result, BigUint::zero());
}
}

View File

@@ -4,3 +4,4 @@ version = "0.1.0"
edition = "2024"
[dependencies]
anyhow = { workspace = true }

View File

@@ -1,3 +1,6 @@
use anyhow::{Result, anyhow};
use core::panic;
fn pkcs7_padding(data: &mut Vec<u8>, block_size: usize) {
if block_size == 0 {
panic!("Block size must be greater than zero");
@@ -12,6 +15,22 @@ fn pkcs7_padding(data: &mut Vec<u8>, block_size: usize) {
data.extend(vec![padding_length as u8; padding_length]);
}
fn pkcs7_unpadding(input: &[u8]) -> Result<Vec<u8>> {
if input.is_empty() {
return Err(anyhow!("Input cannot be empty"));
}
let padding_length = *input.last().unwrap();
if padding_length == 0 || padding_length > input.len() as u8 {
return Err(anyhow!("Invalid PKCS#7 padding"));
}
for &byte in input.iter().rev().take(padding_length as usize) {
if byte != padding_length {
return Err(anyhow!("Invalid PKCS#7 padding"));
}
}
Ok(input[..input.len() - padding_length as usize].to_vec())
}
fn main() {
let mut plain_text = b"YELLOW SUBMARINE".to_vec();
pkcs7_padding(&mut plain_text, 20);
@@ -76,4 +95,43 @@ mod tests {
assert_eq!(data.len(), 255);
assert_eq!(&data[1..], vec![254; 254]);
}
#[test]
fn test_pkcs7_unpadding_valid() {
let result = pkcs7_unpadding(&[65, 66, 67, 4, 4, 4, 4]).unwrap();
assert_eq!(result, vec![65, 66, 67]);
}
#[test]
fn test_pkcs7_unpadding_single_byte() {
let result = pkcs7_unpadding(&[65, 66, 67, 68, 69, 70, 1]).unwrap();
assert_eq!(result, vec![65, 66, 67, 68, 69, 70]);
}
#[test]
fn test_pkcs7_unpadding_full_padding_block() {
let result = pkcs7_unpadding(&[8, 8, 8, 8, 8, 8, 8, 8]).unwrap();
assert_eq!(result, vec![]);
}
#[test]
fn test_pkcs7_unpadding_invalid_padding_byte_zero() {
assert!(pkcs7_unpadding(&[65, 66, 67, 0]).is_err());
}
#[test]
fn test_pkcs7_unpadding_invalid_padding_too_large() {
assert!(pkcs7_unpadding(&[65, 66, 67, 5]).is_err());
}
#[test]
fn test_pkcs7_unpadding_inconsistent_padding() {
assert!(pkcs7_unpadding(&[65, 66, 67, 3, 3, 2]).is_err());
}
#[test]
#[should_panic(expected = "Input cannot be empty")]
fn test_pkcs7_unpadding_empty_data() {
pkcs7_unpadding(&[]).unwrap();
}
}