Recent studies intend web vulnerability discovery, and now want to dig too difficult, but also for php would be able to understand, not science, ah, see a white hat community , go in and see ... the first question has to do and see definitive answers ! So these days it done misc title, now regarded as a summarized it.
1 is a picture
Download pictures directly with the editor open, you can see, the picture was finally added to the flag
2. a beautiful girl
Download pictures, flag directly on the picture ...... this is too simple ...... (not Tietu a)
3. The two-dimensional code
Download attachments, should be a two-dimensional code do not cut into many pieces, did not see the file name, the direct synthesis using ps, then Baidu a two-dimensional scanner, the scanned flag.
4. attendance problem
Is very simple reply ...... i have flag in white hat community, to give flag is flag {welcome-to-bmzsec}.
5. [eis2019] cat
This is slightly more difficult problem, download attachments, see two identical pictures of cats, but sample sizes, suddenly, the thought is not a watermarked, Baidu, watermarking, ran directly script (other people's online script), flag is blind watermark (zoom).
flag
6. Note gif
Download attachments, is found in FIG movable gif format, looming flag be flashed at most, a strong thought ps, direct interception time frame (ps increase Baidu axis) can be seen most flag is cut into two.
7.5210 white hat
First, open a picture editor, certainly garbled, you can see garbage mixed in with the words flag.txt, and then carefully look for flag ... (and with no eggs)! Fantasy picture is not embedded in the file ..., help Baidu, really, with kali extract the files of binwalk (generated _extracted folder), and then get four files, a file flag.txt, very happy, but ... turned out to be empty! Fortunately, there is a zip file ... but FML ... even to the password, try 123456, wrong, how do ... (thinking), try to get the title ... unzip really flag.txt, note submitted directly wrong, base64 decrypted get flag. FIG:
Get In Flag:
c3NjZnR7bnVkbTc2a2NoanlvZG51OHVjaWN9
Base64 decoding obtained:
sscft} {nudm76kchjyodnu8ucic
8. strange sound
Have not done before sound ctf, sounds like Morse code, direct Baidu, open sound with audacity tool control Morse code table, write the ciphertext directly decoded flag
This is the end misc problems, start web questions, look forward to the time of writing (II) ............