ctf offense and defense in the world misc writeup

misc:
the this IS flag:
direct flag GET
pdf:
The pdf documents into word document, moving picture show under the hidden flag
Tathagata chapter 13:
and on Zen Buddhism -> rot13-> base64
adhere to 60 seconds:
download files using decompile tools xjad decompile, open the folder using vscode open PlaneGameFrame.java file, find the flag, the contents of the base64 decode get real flag.
give your flag
using stegslove open the file using the flame pattern discovery incomplete two-dimensional code using ps completion
dish intercepted a dog food dish of chicken sent to the cat's motion picture, but found another mystery
picture: https: //uploader.shimo. im / f / wps4BdwghDUr9SxA.png Image: https://uploader.shimo.im/f/eGBFIRLoY5sHVKKe.png Image: https://uploader.shimo.im/f/kJ82hxku21Ml4T2X.png
lift the table
picture: https: // uploader .shimo.im / f / c3maiLvonUEWNceD.png
simpleRAR
1. open rar files using winrar found containing a png file, but the file header is incorrect picture: https://uploader.shimo.im/f/XHmG0j18g3Mv0227.png
2. 7A to 74 in the 010, the extracted image png
Picture: https://uploader.shimo.im/f/ZWcktW9R4G0s9k5R.png
3. gif file suffix to use stegsolve view files to find hidden damage to the two-dimensional code, entitled suggestive: Two Layers using ps open and found two similar layers were stored, were used to find two incomplete open stegsolve dimensional code, which is assembled and secured using ps positioning symbols plus
4. using QR research scanned
image: https://uploader.shimo.im/f/A6tKYQbEwrcHbY5z .png

Open the file using 010editor found pseudo-file encryption, modify the tag compressed source file directory of the file to open 00
Pictures: https://uploader.shimo.im/f/qkWiLPbvLR82Klo8.png
TXT file to decrypt the encrypted file base64 get flag
pictures : https://uploader.shimo.im/f/bbt28gy1pgwOB0ZC.png
effort no matter how high are also afraid of knives
accessory is a packet traffic, use a separate password foremost archive, compressed bundle file named "flag.txt "so the rest of the code is to find extracting
picture: https://uploader.shimo.im/f/fbJ9EzHM1DwpTg5I.png
1

Released seven original articles · won praise 0 · Views 81

Guess you like

Origin blog.csdn.net/q20010619/article/details/104875173