buuctf

White | png image change the height of the
png image change the height
[picture outside the chain dump failure (img-PojN2D3v-1567086301372) ( evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23464203 / ENResource / p2321)]
foundation crack | archpr blasting
you actually drive me away | open
010editor open the rearmost Flag
ningen | the Easy
binwalk
of Foremost
blasting
LSB | SS
[picture outside the chain dump failure (img-3ZEH1eki-1567086301372) ( evernotecid: // 74A3E6DA-E009-4797-AA60 -5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2322)]
[image dump outer link failure (img-73OkHr5k-1567086301373) ( evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23464203 / ENResource / p2323)]
save bin
two-dimensional code scanning
rar | archpr blasting
qr | two-dimensional code scanning
Wuzhen summit kinds of map | Notepad to open
wireshark | http export target
Export http Object
search Flag
[picture outside the chain dump failure (img-yRdrxVGS-1567086301373) ( evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23464203 / ENResource / p2324)]
to find the password
secret file | right attribute
Three Days to light
Braille
wav file
audacity opens
Morse code
to the song, perhaps | Morse code
inside the mirror world | SS
[picture outside the chain dump failure (img-hwXdn7em-1567086301374) ( evernotecid: // 74A3E6DA -E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23464203 / ENResource / p2325)]
Einstein
binwalk
of Foremost
image properties
this_is_not_password
to extract the password
Xiaoming safe
binwalk
of Foremost
blasting four-digit password
FLAG
SS open
[Image dump outer link failure (IMG-KTNksaov-1567086301375) (evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2326)]
Save bin
decompress a file elf
ida open see hctf
1 strings | grep "hctf"
easycap
track tcp stream
is sniffing the traffic
export http target
a php file php with 010editor not actually open hexadecimal view
flag
plum blossom of the bitter cold
010editor open behind a lot af 0-9
with open ( '1.txt', 'R & lt') AS H:
    H = h.read ()
BB = ''
TEM = ''
for I in Range (0, len (H), 2):
    TEM = '0x' + H [I] + H [I +. 1]
    TEM = int (TEM, Base = 16)
    BB = + (CHR (TEM))
Open with ( '2.txt', 'W') AS FF:
 ff.write (BB)
1,234,567,891,011
[image dump outer link failure (img-YNWznUSR-1567086301375) ( evernotecid: // 74A3E6DA-E009-4797-AA60- 5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2327)]
with Open ( '2.txt', 'R & lt') AS F:
 F = reached, f.read ()
B = Open ( '3.txt', 'W')
for I f.split in ( '\ n-'):
 b.write (i.lstrip ( '(') The rstrip ( ')') Replace ( ',', '') + '\ n-'..)
12345
[outer chain image dump failure (IMG-bveFTjxS-1567086301375) (evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2328)]
gnuplot
Plot '3.txt'
HTTPS: //tu.sioe. cn / gj / huidu /
gradation processing
backdoor killing
d shield sweep
[Image dump outer link failure (IMG-whpjC0No-1567086301376) (evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2329)]
Snake
binwalk
of Foremost
Base64
HTTPS: //blog.csdn. NET / zz_Caleb / Article This article was / Details / 91,973,626
http://serpent.online-domain-tools.com/
[image dump outer link failure (img-Xyvb5Jvq-1567086301376) ( evernotecid: // 74A3E6DA-E009-4797-AA60- 5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2330)]
A = '' 'C T F. {W H O _ K n-E W _ S E R & lt
P E n-T _ C I P H E R & lt _ E X I S
T E D}.' ''
Print a.replace ( '', ''). Replace ( '' , ''). replace ( ' \ n', '')
1234
Dutch broadband data leakage
RouterPassView
open
search username
nine serial
binwalk
of Foremost
steghide info xx.jpg
steghide Extract -sf xx.jpg
ko.txt
extracting
another world
Notepad to open the
last 010
groups of eight characters turn
import binascii
= A '' '01101011
01,101,111
01100101
01101011
01101010
00110011
01,110,011' ''
B = ''
for II in a.split ( '\ n-'):
 B + = CHR (int (II, 2))
Print B
12345678910111213
mysterious tornado
Blasting
. ++++++> +++++++++++++
OOK
brainfuck
https://www.splitbrain.org/services/ook
in Flag in mask
binwalk
of Foremost
7Z decompression VMDK
7Z filename X
HTTPS: //www.splitbrain.org/services/ook
refreshed picture
F5-Steganography
the Java Extract ./Misc. jpg -e misc
obtain a pseudo-encrypted compressed directly extract
thoughts through time
audacity open
Morse code
Mysterious ✨
input
122xyz
OD should be
webshell backdoor
d Shield scanning
hidden key
notepad
search flag
in the packet clues
export http objects
from the beginning "/ 9j /", shows the following data as jpg image, "/ 9j /" after base64 after decoding result is "\ xff \ xd8 \ xff" , the three bytes is three bytes beginning jpg file, it can be concluded that the following documents as jpg files.
data: image / jpeg; base64,
browser
chopper 666
derived objects http
compressed requires a password
image painted password
https://4hou.win/wordpress/?paged=2&cat=1023
Meow Meow
ss give PNG
[image outside the chain transfer memory failure (img-BSze7Mml-1567086301376) ( evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23464203 / ENResource / p2331)]
[Image dump outer link failure (img-thOxtvcm-1567086301377) ( evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23464203 / ENResource / p2332)]
modify the height
[image dump outer link failure (img- 1567086301377-hvbdSnNI) (evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2333)]
win10 drawing inverse color
scanning two-dimensional code
to download a compressed
only by decompression WinRar
ntfstreamseditor scan
pyc file
https : //tool.lu/pyc/
decompiled script is encrypted and c reverse
DEF the decrypt (c):
    c = c [:: -. 1]
    in Flag = ''
    for I in Range (len (c)):
        IF I% 0 == 2:
            S = int (C [I]) - 10
        the else:
            S = int (C [I]) 10 +
        S = CHR (I ^ S)
        S + = In Flag
    return In Flag
1234567891011
weak passwords
compressed open comment invisible character
copied to sublime text3 Select display Morse code
decoding transfected capital
decompression
lsb steganographic
lsb.py
Spider way ✨
time steganographic
https: // coxxs. Me / 642
http://yulige.top/?p=236
tshark -T -R & lt out.pcap Data Fields -e> out.txt
Lines = Open ( "out00.txt", 'RB'). the readlines ()
Files Open = ( "out01.txt", "WB")
for in Lines Line:
 files.write (. line.strip () decode ( 'hex'))
files.close ()
12345
import base64
lines = open("out0.txt",'rb').readlines()
file1 = open("new",'wb')
result = ''
for line in lines[4:-4]:
 result += line[9:].strip()
file1.write(base64.b64decode(result))
'' '
Result =' '
Lines = Open ( "out.txt",' RB ') the readlines ().
Print Lines [. 4: -4]
' ''
1234567891011121314
A = Open ( "out01.txt", 'RB' ) .readlines ()
file1 = Open ( "RESULT1", 'WB')
for I in Range (len (A)):
 BB = A [I] .strip ()
 IF A == BB [-I. 1] .strip ():
  Continue
 file1.write (BB + '\ n-')
1234567
decompression flag.gif
the Identify -format "% T" flag.gif
[image dump outer link failure (img-W46ai2jZ-1567086301377) ( evernotecid: // 74A3E6DA- E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23464203 / ENResource / p2334)]
significant binary, and 0 to 20 change, the transducer 50 1.
binary switch turn hex ascii code
# coding: utf-8
import binascii
import hashlib
# import base64
# lines = open('result1.txt','rb').readlines()
# file = open('file','wb')
# flag = ''
# for line in lines[1:-1]:
#  flag += line[9:]
# file.write(base64.b64decode(flag))
a = open("11",'r')
b = a.read().replace("“",'').replace("”","").replace("20",'0').replace("50",'1').replace('6','')
binascii.unhexlify = BB (hex (int (B, 2)) [2: -1])
Print 'In Flag {' + hashlib.md5 (BB) .hexdigest () + '}'
12345678910111213141516
the Identify -format "% S% T \ n "flag.gif
I love Linux
https://www.cnblogs.com/puluotiya/p/5462114.html
https://www.cnblogs.com/harmonica11/p/11365782.html
data python serialization file
the FF D9 out after storage, the sequence of the read out file
Import the pickle
with Open ( 'Q', 'RB') AS F:
    F = the pickle.load (F)
Data List = ()
for I in Range (len (F )):
    TEM = [ ''] * 100
    data.append (TEM)
for I, J in the enumerate (F):
    for m in J:
        Data [I] [m [0]] = m [. 1]
for I in Data:
    Print ( ''. join(i))
123456789101112
[image dump outer link failure (IMG-gNVt98SV-1567086301378) (evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2335)]
USB ✨
https://wenku.baidu.com /view/b7889b64783e0912a2162aa4.html
RAR file structure
[image dump outer link failure (IMG-swFxOcqG-1567086301378) (evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2336)]
[outside the chain picture dump failure (img-69v6RI79-1567086301380) (evernotecid: // 74A3E6DA-E009-4797-AA60-5DEED9FE4F7A / appyinxiangcom / 23,464,203 / ENResource / p2337)]
https://blog.csdn.net/like98k/article/details / 79,533,536
https://blog.csdn.net/qq_36609913/article/details/78578406
https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx
mappings = { 0x04:"A",  0x05:"B",  0x06:"C", 0x07:"D", 0x08:"E", 0x09:"F", 0x0A:"G",  0x0B:"H", 0x0C:"I",  0x0D:"J", 0x0E:"K", 0x0F:"L", 0x10:"M", 0x11:"N",0x12:"O",  0x13:"P", 0x14:"Q", 0x15:"R", 0x16:"S", 0x17:"T", 0x18:"U",0x19:"V", 0x1A:"W", 0x1B:"X", 0x1C:"Y", 0x1D:"Z", 0x1E:"1", 0x1F:"2", 0x20:"3", 0x21:"4", 0x22:"5",  0x23:"6", 0x24:"7", 0x25:"8", 0x26:"9", 0x27:"0", 0x28:"\n", 0x2a:"[DEL]",  0X2B:"    ", 0x2C:" ",  0x2D:"-", 0x2E:"=", 0x2F:"[",  0x30:"]",  0x31:"\\", 0x32:"~", 0x33:";",  0x34:"'", 0x36:",",  0x37:"." }
nums = []
keys = open('usbdata.txt')
for line in keys:
    if line[0]!='0' or line[1]!='0' or line[3]!='0' or line[4]!='0' or line[9]!='0' or line[10]!='0' or line[12]!='0' or line[13]!='0' or line[15]!='0' or line[16]!='0' or line[18]!='0' or line[19]!='0' or line[21]!='0' or line[22]!='0':
 continue
    nums.append(int(line[6:8],16))
keys.close()
output = ""
for n in nums:
    if n == 0 :
        continue
    if n in mappings:
        output += mappings[n]
    else:
        output += '[unknown]'
print 'output :\n' + output
 
output :
KEYXINAN
[Finished in 0.1s]
123456789101112131415161718192021222324
binwalk xxx
foremost xxx
tshark -r key.pcap -T fields -e usb.capdata > usbdata.txt
ci{v3erf_0tygidv2_fc0}
fa{i3eei_0llgvgn2_sc0}
栅栏
flag{vig3ne2e_is_c00l}
sqltest  未完成
import requests
import os
import urllib
import re
oo = []
pp = []
a = os.listdir('.')
for ii in a:
 vv = open(ii,'r')
 if "This's Title!" in vv.read() and 'ascii(substr(((select concat_ws(char(94), flag)' in urllib.unquote(ii):
  oo.append(urllib.unquote(ii))
for ii in oo:
 # print ii
 # print ii[ii.find('>')+1:]
 re.findall Print (r ', (. *?),', ii) [1]
123456789101112131415
hijacked a mysterious gift
http filter
tcp stream tracking
Import hashlib
Print hashlib.md5 ( 'adminaadminb'). hexdigest ()
--- -------------
Disclaimer: this article is the original article CSDN bloggers "mo0rain", and follow CC 4.0 BY-SA copyright agreement, reproduced, please attach the original source link and this statement.
Original link: https: //blog.csdn.net/qq_41173457/article/details/100147514

Guess you like

Origin www.cnblogs.com/ainv-123/p/11758022.html