Chapter 68 Cracking the Game (Part 2)
This type of game usually ranges from simple to complex, similar to the level of a single-player game, but what you need to use here is computer knowledge, which involves a lot of content, such as network knowledge, cracking knowledge, hacking knowledge, etc.
The first level is very simple. Xu Yi right-clicked without thinking and checked the source code of the web page. Sure enough, there was a sentence in it, "Haha, you discovered it. But next time it will not be that easy. The pass code for this level is BD." Xu Yi saw that the font color set by these words was the same as the background color. He used the mouse to select the content on the web page, and he could indeed see these words.
This level is indeed very simple. You can just choose it by chance. It seems that the questioner sets up to motivate the enthusiasm of the level passers-by. Of course, it is only for those novices who have just started learning related knowledge.
The second level was successfully entered. The content of the web page was similar to the previous one, and it would definitely not be as simple as the first level. Xu Yi still subconsciously wanted to view the source code. After all, nothing could be seen directly from the web page. If you want to break through, you can only start with the source code. After right-clicking, a dialog box pops up: "^_^Come on, keep working hard!".
It turned out that the right click was blocked. This method was used by many people in the early days. Many stingy webmasters were unwilling to let visitors copy and save the content on the web page, so they used this method to make it difficult for those visitors who do not understand the technology. Usually, most people have a more casual attitude. If you don’t let them copy, you won’t have to catch the above content.
Of course, this level is not difficult for Xu Yi, and he can only block novices. Xu Yi has N methods to crack. This effect is mainly achieved using a dynamic script called JavaScript (note: this language has no relative relationship with the legendary Java language, and is said to be the most misunderstood programming language). When the visitor right-clicks the mouse, it will know (capture) immediately, and then respond to this "event" according to the predetermined program functions written by the programmer, such as right-clicking, no response, pop-up dialog boxes, etc.
So, how can I crack it? By the way, it is to invalidate this script language and make it ineffective.
Web browsers (such as IE) integrate a script language interpretation function. As long as this function is disabled, the scripting program in the web page becomes a decoration and there will be no effect. This function can be easily disabled, just simply check one of the function options.
However, for Xu Yi, this method is relatively troublesome. After reading the source code, you have to restore the settings. Because if this function is disabled, some dynamic effects on the web page will be gone. Xu Yi used the method to directly type in the command "view-source:" in front of the URL in the address bar. This command is also a command known to the browser itself, which means "view source file". After executing "view-source: http://***", the source code inside is displayed.
There is another simple method, which is to directly use the "source file" function on the browser toolbar. In addition, you can also use other software to open it, such as notepad, writing board, etc. in the Windows system. You can directly fill in the URL into the address of the dialog box to be opened. If you are not afraid of trouble, then use the download software to download this page and then read it.
Xu Yi successfully saw the source code of the second level web page. After browsing it roughly, he found a relatively suspicious code. Xu Yi inferred that the pass password should be hidden in it.
This coded content is: "%B9%A7%CF%B2%B9%FD%B9%D8%A3%A1%B1%BE%B9%D8%C3%DC%C2%EB%CA%C7%45%32"
The second level is a bit difficult, Xu Yi smiled. He knew how to crack this strange code. Looking at the form of these, it is obviously URL encoding, which is the encoding when converting URLs. When surfing the Internet, you can often see such encodings, which are a format used by browsers to package table input. This situation is most common when searching for things with search engines. The search content is usually converted into this form and presented in the browser's address bar (as for why this is explained later).
URL encoding is actually the hexadecimal system of the character ASCII code (US National Information Exchange Standard Code), but it changes slightly, and "%" needs to be added before it. For example, the backslash "\", its ASCII code is 92, and the hexadecimal system of 92 is 5C, so its URL encoding is %5C. The same principle is given to the encoding of Chinese characters. For example, the ASCII code of "Hu" is 17670 and the hexadecimal system is BAFA, so its URL encoding is "%BA%FA". Since a Chinese character accounts for two bytes, there is an additional "%" in the middle.
URL encoding is usually not used in normal times, because IE will automatically convert non-numeric letters entered into the address bar into URL encoding. Only programmers need to use the principles when writing programs with certain related functions. Of course, as a hacker, this encoding needs to be mastered, and some intrusion behaviors require this knowledge (such as SQL injection).
Xu Yi had already mastered this little knowledge well, so he simply called out the compiler and wrote a URL code converter on the spot. Anyway, he knew the principle, so he didn't take much time to write it, and he could also use it in the future.
Copy that code into the mini program I just wrote and converted it into a few Chinese characters: "Congratulations for passing the level! The password of this level is E2".
Xu Yi smiled. Although the question is not difficult, it feels good to pass the level like this. The difficulty of the second level is obviously much greater than the first level, and it is probably going to stump a rookie. How difficult is the third level? Xu Yi is really looking forward to it, hoping to give him a headache. He is studying cryptography recently.
Fill in the password of the second level and successfully enter the third level. The steps are similar, so you still have to check the source code. However, this time the source code looks quite chaotic. Unlike the first two levels, you can find that the password is probably in a certain part of it at a glance. There are many codes for interference on the page of the third level, mainly script codes. This requires the level breaker to be familiar with web programming and be able to understand these codes. At least you should know which functions should be completed by those codes, which codes are useful, and which codes are just interfering.
Xu Yi quickly found the target, and a cipher text appeared during verification. When Xu Yi looked at it, he knew that he was using JScript.Encode encryption, which could be solved by using the corresponding decryption function. This may be a difficult problem for others, but Xu Yi could naturally handle it easily. He successfully entered the fourth level. He wanted to see how many levels there were and wanted to see the last level earlier.
---
Hacker websites generally have similar games. I will put an address in the next chapter and everyone will try it.
Chapter completed!