BUUCTF-Misc(51-60)
outguess是一堆文件无从下手,在图片这里找到了社会主义核心代价观暗码
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082940391-674241218.png
解密一下得到
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082939994-1374049646.png
之后又在这个压缩包提取了一个压缩包,用刚才解密的暗码竟然不对
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082939559-1544353097.png
然后厥后搜了wp,说outguess是一种加密,然后下载,解密
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082939188-1796857973.png
就得到flag了
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082938735-2006267129.png
谁赢了比赛?
打开标题没啥思绪直接是binwalk提取出一个加密的压缩包
然后暴力破解
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082938300-1849655572.png
出来就是一个gif
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082937595-1337307873.png
我们拆解成帧还是没有东西
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082937039-704345890.png
看了题解说是,保存刚才的那一帧,然后再搞
然后再stegsolve换一下通道 RED plane 0
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082936583-622762205.png
然后扫一下
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082936113-577432277.png
穿越时空的思念
参考:
Buuctf-misc-穿越时空的思念 - 夜布多 - 博客园 (cnblogs.com)
这里能很明显听出来摩斯暗码就是有点麻烦
这里用大佬的方法,先用Audacity导出wav形式(这里一定要提取右声道的音频)
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082935487-863216995.png
然后用kali里的 morse2ascii去提取,然后就没然后了,我干不出来
不想搞了就是一个
flag{f029bd6f551139eedeb8e45a175b0786}WUSTCTF2020]find_me
属性里找到
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082934448-186398150.png
盲文加密的https://www.qqxiuzi.cn/bianma/wenbenjiami.php?s=mangwen
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082933994-534337904.png
我有一只马里奥
运行之后得到
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082933490-1923932730.png
然后010editor找到
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082932994-1843078778.png
然后就先相识一下ntfs
NTFS文件隐写_ntfs隐写-CSDN博客
使用工具扫描出来
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082932627-708210669.png
然后直接导出
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082932241-477081042.png
KO
ook解密Ook! Programming Language - Esoteric Code Decoder, Online Translator (dcode.fr)
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082931780-1283348168.png
base64隐写
参考:
ACTF新生赛2020]base64隐写-CSDN博客
直接上佬的脚本吧,我懒狗
def get_base64_diff_value(s1, s2):
base64chars = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/'
res = 0
for i in xrange(len(s2)):
if s1 != s2:
return abs(base64chars.index(s1) - base64chars.index(s2))
return res
def solve_stego():
with open('ComeOn!.txt', 'rb') as f:
file_lines = f.readlines()
bin_str = ''
for line in file_lines:
steg_line = line.replace('\n', '')
norm_line = line.replace('\n', '').decode('base64').encode('base64').replace('\n', '')
diff = get_base64_diff_value(steg_line, norm_line)
print diff
pads_num = steg_line.count('=')
if diff:
bin_str += bin(diff).zfill(pads_num * 2)
else:
bin_str += '0' * pads_num * 2
print goflag(bin_str)
def goflag(bin_str):
res_str = ''
for i in xrange(0, len(bin_str), 8):
res_str += chr(int(bin_str, 2))
return res_str
if __name__ == '__main__':
solve_stego()GXYCTF2019]gakki
010editor看到文件尾后面还有一个rar,我们给他提取出来
然后是个加密的
我们直接暴力破解
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082931083-536592406.png
然后得到flag.txt
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082930340-1526132583.png
对这堆乱码数据作字频统计
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082928963-1516042326.png
flag{gaki_IsMyw1fe}ezmisc
看到png后缀,敏锐的嗅觉告诉我这该宽高了,丢工具里就出来了
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082928430-1939270625.png
flag{1ts_vEryyyyyy_ez!}caesar
标题直接告诉凯撒加密了
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082928041-1061222000.png
然后我们就丢同流合污工具箱
https://img2023.cnblogs.com/blog/3439569/202405/3439569-20240527082927328-1022580135.png
免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。
页:
[1]