BITCTF-MISC

MISC

In order to record the notes of this course dish of chicken do misc

Sign 85

First look at the topic

prompted base85
open kali, using python library to decode the base64 (there are base85 decoded)

(In fact, as long as you can lose python3
I thought kali There is no python3, Baidu how to install a large circle python3 ......)

>>> s = 'W^7?+dv|3qV{dI`UvzI@V{~SH'
>>> import base64
>>> base64.b85decode(s)
b'flag{we1come_to_ctf}'

over~

Caesar XIII

Group exercise, look at the title -

the original characters:
ebdgc697g95w3
decryption :( Caesar was thirteen times thirteen )
13: roqtp697t95j3
After submitting found incorrect
read the title, the keyboard
will roqtp697t95j3 on the keyboard to move down one too:
Flag: yougotme
over ~
used to decrypt tools: https://www.ctftools.com/down/

easy_misc1

The old rules, see the topic ~

gave a picture

you can see its length and width are different
suspect may be hidden below the flag
to open 010
to find the length, width as shown

they are modified to the same value (values are modified into large)

save Sure enough, after more than a line of text below the picture

to get Flag: png_1s_interesting
(to note here is 1s, not the ls ...)

rose Olver

Guess you like

Origin www.cnblogs.com/Zzhanp/p/12013954.html