CTF - World -misc offensive and defensive novice area

This problem flag title format has been told, the answer is simple.

After you download the attachment, the disc will hang the virtual machine to start using  strings linux | grep flag 'll find a O7avZhikgKgbF / flag.txt then root with under mount linux / mnt, linux CD will be mounted under mnt directory, switch to the mnt directory, use cat O7avZhikgKgbF / flag.txt commands operate on a flag read content was found to be a base64 encoded, the decrypted flag .

 

This accessory is a gif with UleadGIFAnimator to a one-ching software to view this gif will find that there is a lack of three-dimensional positioning section of code, PS to complement , swept away the can.

Two-dimensional code structure and principles:

          http://www.360doc.com/content/17/1223/09/412471_715543070.shtml

The Foxit Reader or Google's PDF-viewer and search flag copy and paste

 

 

这个rarwinhex打开就知道是不符合rar的开头 所以把文件头改为7A改为74 保存解压用winhex查看格式发现其实是gif,修改后缀 用ps把两个图层分别分离开来保存。
然后再用stegsolve查看发现是两张半二维码。在用ps拼接再扫得flag

较常用的图片格式Png、Jpg、Gif、Bmp 文件解析

https://blog.csdn.net/sj_wll/article/details/81075930

 

 

这个打开发现是一个游戏,然后直接用Java的开发工具打开查看源码,里面得到flag 提交不对于是察觉flag最后还有一个= 联想base64位,再用线上工具转换得flag

Base64在线解码:

http://tool.oschina.net/encrypt?type=3

 

各种编码方式:

https://blog.csdn.net/dyw_666666/article/details/89973048

 

发现里面是黑白黑白照片很有规律 因为没有分割所以不可能是摩斯电码,所以我就联想是二进制二进制转字符串得:flag{FuN_giF}   二进制先转化为十六进制然后十六进制转化为字符串104/8=13

 

 

发现是一个佛经。反正读不懂,然后用在线工具与佛论禅解密,得到一串疑似base64编码,再rot13一下,再base64解密得flag

与佛论禅:http://www.keyfc.net/bbs/tools/tudoucode.aspx

 

解密方法,两个一位,16进制转10进制,然后减去128再转成字符即可

可用python

 

string = "c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2"

flag = ''

for i in range(0,len(string), 2):

    s = "0x" + string[i] + string[i+1]

    flag += chr(int(s, 16) - 128)

print(flag)     (网上找的如若侵权,请联系我。因为不记得链接地址了

 

 

foremost分离文件,得到一个加密的压缩包,点进去查看发现一个flag.txt文件,wireshark下查找flag.txt字符串,追踪TCP流,最终在第1150个包发现一段图片的16进制编码,将其用winhex另存为一个图片,得到压缩包的密码,解压得到flag.怎么导出的也不太会

 

谷歌装PDF-viewer 控制台输入document.documentElement.textContent 得到一串AB编码而成的字符串,有分割很规律A变为 . ,B变为 - ,摩斯解密即可

 

这个要学习一下压缩包伪加密用winhex09 00 改为 00 00这叫全局方式位标记 保存跟新压缩包解压发现是一个base64编码文件 ,亲测在线解压工具不行 所以网上得知是base64隐写,用python2通过脚本解密得flag

压缩包伪加密:

https://www.cnblogs.com/R4v3n/articles/8194287.html

 

 

 

 

 

 

 

 

Guess you like

Origin www.cnblogs.com/cat47/p/11299188.html