[Network Security | Misc] Plaintext Attack ACTF2020

This question examines plaintext attacks

text

After decompression, two compressed packages are obtained:

Insert image description here
._none.zip cannot be decompressed, but there is a compressed package and a picture in none.zip:

Insert image description here
There are two encrypted files in res.zip:

Insert image description here
Therefore, this question examines image steganography. Use 010 to open the image and see flag.txt at the end.

Insert image description here
It means that the picture has been modified, its source file is zip, and the zip file header is: 50 4B 03 04

Therefore, choose to paste 0 bytes at 03:

Insert image description here

Enter 2:

Insert image description here
Just change the following 00 00 to 50 4B:

Insert image description here
Save as woo.zip file to open flag.txt:

Insert image description here
It is not feasible to use this string as the password to decrypt res.zip

Combining the title plaintext attack with the compressed package attributes (the CRC, size, and name of flag.txt are all consistent):

Insert image description here
It is guessed that flag.txt is stored in the two zips in the same way, and it can also be inferred that the two zips are compressed using the same encryption algorithm.

Therefore, you can use woo.zip as the plain text file and res.zip as the encrypted file to carry out plain text attacks.

Insert image description here
Get the decrypted file and get the flag after opening it

flag{3te9_nbb_ahh8}

Guess you like

Origin blog.csdn.net/2301_77485708/article/details/135393140