White hat community training ground (ctf) wp (a) - misc

Recent studies intend web vulnerability discovery, and now want to dig too difficult, but also for php would be able to understand, not science, ah, see a white hat community , go in and see ... the first question has to do and see definitive answers ! So these days it done misc title, now regarded as a summarized it.

1 is a picture

Download pictures directly with the editor open, you can see, the picture was finally added to the flag
Here Insert Picture Description

2. a beautiful girl

Download pictures, flag directly on the picture ...... this is too simple ...... (not Tietu a)

3. The two-dimensional code

Download attachments, should be a two-dimensional code do not cut into many pieces, did not see the file name, the direct synthesis using ps, then Baidu a two-dimensional scanner, the scanned flag.
Here Insert Picture Description

4. attendance problem

Is very simple reply ...... i have flag in white hat community, to give flag is flag {welcome-to-bmzsec}.

5. [eis2019] cat

This is slightly more difficult problem, download attachments, see two identical pictures of cats, but sample sizes, suddenly, the thought is not a watermarked, Baidu, watermarking, ran directly script (other people's online script), flag is blind watermark (zoom).
Here Insert Picture Description
flagflag

6. Note gif

Download attachments, is found in FIG movable gif format, looming flag be flashed at most, a strong thought ps, direct interception time frame (ps increase Baidu axis) can be seen most flag is cut into two.
Here Insert Picture Description
Here Insert Picture Description

7.5210 white hat

First, open a picture editor, certainly garbled, you can see garbage mixed in with the words flag.txt, and then carefully look for flag ... (and with no eggs)! Fantasy picture is not embedded in the file ..., help Baidu, really, with kali extract the files of binwalk (generated _extracted folder), and then get four files, a file flag.txt, very happy, but ... turned out to be empty! Fortunately, there is a zip file ... but FML ... even to the password, try 123456, wrong, how do ... (thinking), try to get the title ... unzip really flag.txt, note submitted directly wrong, base64 decrypted get flag. FIG:
Here Insert Picture Description
Here Insert Picture Description
Here Insert Picture Description
Get In Flag:
c3NjZnR7bnVkbTc2a2NoanlvZG51OHVjaWN9
Base64 decoding obtained:
sscft} {nudm76kchjyodnu8ucic

8. strange sound

Have not done before sound ctf, sounds like Morse code, direct Baidu, open sound with audacity tool control Morse code table, write the ciphertext directly decoded flag
Here Insert Picture Description
Here Insert Picture Description
Here Insert Picture Description
This is the end misc problems, start web questions, look forward to the time of writing (II) ............

Released nine original articles · won praise 2 · Views 3081

Guess you like

Origin blog.csdn.net/xiaokan_001/article/details/103969609