topic
Novice practice area
1. this_is_flag
就Ctrl+C Ctrl+V
2.pdf
Open the attachment, this thing
can be seen here is a string of text Ctrl+C Ctrl+V
paste into the notepad to know the flag
3. Thirteen Palms
I opened a bunch of traditional Chinese characters in the attachment. At first, I thought it was a new Buddha’s code,
but I couldn’t decode it. Then I found a code that talks to Buddha and Zen. The decoding
is correct. Thirteen palms should be ROT13 and
finally base64.
4.give_you_flag
Open the attachment, a gif picture,
use the frame number extractor in StegSolve, this thing appears in the 50th frame,
use PS to fix the QR code, and then scan it to get the flag
5. Persist in 60s
Open the attachment. After opening it, you find that it is a game. If you have that patience, you can play it by yourself for 60 seconds, but it is not easy. Here uses a direct java decompiler tool java decompiler, drag the file into it
6.gif
Open the attachment, black and white black and white black and white. . . . Isn’t it 010101?
Turn white to 0 and black to 1
01100110011011000110000101100111011110110100011001110101010011100101111101100111011010010100011001111101
and then go to the Internet to find a binary conversion to a string
link and attach it to
get the flag
.
7. Lift the table
A set of two, converted into binary, and converted into ASCLL code.
Here, use the JPK transcoding
tool link to attach.
First, convert to seven-bit binary (inradix is 16, outradix is 2, BitsPerBlock is 7)
. The code uses 7 digits. And then converted to ASCII code:
8.ext3
Download the attachment, why not open it, because this is something that I don’t know what it is. Change the format to zip and
search for the flag directly in the compressed package. The text of the flag will come out. Just
use a base64.
9.stegano
Open the attachment, pdf file, directly Ctrl+A to select all Ctrl+C to copy, open a notepad Ctrl+V to paste,
a Morse password
that looks like a Bacon password appears, change B to -, A to ., Morse decode , Get the flag (the title says to be lowercase, don’t be
pitted ) -.-. — -. --. .-. .--…- .-… .--… — -.… --…-- …- . .-… .- --. —… .---- -. …- .----… .---- -… .-… …-- – …--…… …- --. …–
10.SimpleRAR
Open the attachment, there is a txt file inside, and then
put it into WinHex, here is the secret.png part.
Baidu checked the rar at the beginning of each block.
We want the file block instead of the sub-block, so we changed 7A to 74 , Successfully decompressed
Then open it with WinHex and find it is in gif format, rename it and open it with PS, and find that there are two blank layers.
Right-click layer 1 and 2, you can export
the two layers in PDF format to extract the two layers separately, open it with StegSolve, and keep clicking the arrow Until the image is displayed, it’s
left to rely on your own PS technology.
Currently, this is the question for my novice zone