The first "Zhuolang Cup" Graduate Network and Information Security Technology Contest of the University of Graduate Innovation Alliance Hebei Province Trial Part WP

Topic one sign-in

Click F12 to enter the developer mode, revisit the web page, and get several style files.

 

 

Search for flag in the style file index.js and find

 

Copy this string of code to the console for execution, and get the final flag

flag{CuB4_@nd_JSfuck}

 

Topic two re 1

  1. (Checked with Exeinfo PE and found that it was packed with upx.exe.

 

2. Use upx.exe -d command to remove the shell

 

3. Use ida pro to convert to pseudo assembly

 

Analysis of the code found that the flag is "HappyNewYear!"

Topic 3 Cryptography 1

 

Base16 decoding

 

Base32 decoding

 

Base64 decoding

 

Base91 decodes to get the flag.

flag{base_n0t_3asy}

Topic Four  Android 1

Unzip the apk, use the dex2jar software to decompile classes.dex and compile it into a jar file, then use the jd-ui software to view the code, search for flag{, in the showMessageTask of MainActivity, the result of finding the flag is that when cnt=1000 times, it can pop up correctly As a result, so use the software to modify the smali file, let cnt=1, and only need to win once to pop up the flag.

flag value:

flag{ 107749}

Topic 5  misc1

Use dtmf2num audio decoding:

45774391614390919680552035340229102217126562041792203410479326635706552497458

Hexadecimal:

6533633533636265633936656138626465306332393465353230623337613532

String: e3c53cbec96ea8bde0c294e520b37a52

flag value:

flag{e3c53cbec96ea8bde0c294e520b37a52}

Topic 6  Cryptography 2

It can be seen from the file that there are n1, n2, n3 and c1, c2, c3, n is very large, and e is very small. The analysis is a low encryption index broadcast attack, and different ciphertexts are obtained through different moduli.

flag{8c17fb02684fa73e6a296a89b63b56bf}

Topic seven  misc4

Unzip the file to get xxx, add the extension .zip, unzip to get the word file, decrypt it with vnc, get the unzip password! QAZ2wsx, convert the file to zip format and unzip, get a bunch of folders, open the document in word .xml, get MZWGCZ33GY4TQZBVGFQTCOLEHBQTCMRRMNSTKOBRGQ4TSZBXMI3TAMJWGY4H2=== in the last few lines, just decode it through base32

flag value:

flag{698d51a19d8a121ce581499d7b701668}

Guess you like

Origin blog.csdn.net/qq_35576225/article/details/109292938