PolarD&N2023秋季个人挑战赛—Misc全解

饭宝  金牌会员 | 2023-11-13 05:54:51 | 显示全部楼层 | 阅读模式
打印 上一主题 下一主题

主题 898|帖子 898|积分 2694

签个到叭

题目信息

压缩包带密码,放到010查看PK头错误,改回去。。


解压后得到
  1. 562+5Yiw5Lmf5LiN6IO96L+Z5LmI566A5Y2V5ZGA77yM5b+r5p2l55yL55yL6L+Z5piv5LuA5LmI5Yqg5a+GOglVMkZzZEdWa1gxOHRLZU02bjY4Q3NkRGphWkFZaTlJY1lGMkxNd3FOYzFVPQ==
复制代码

注意文档里还藏有一段文字,在第一页下方,改下颜色就可以看到

base64解码

AES解码,但需要key,从图片获取,根据提示key为长春某地点名称MD5加密
百度识图可知图片上地点是“净月潭”,MD5加密后为:98f1ecdceaa0f4d6445f48287802dfd9

得到前缀,然后懵了。。。。该干什么呢?回去看了看没修改的压缩包又研究了一下,发现一个可疑之处,我们虽然不能解压但可以点进去看看里面是啥

发现txt里面有
  1. 扫二维码关注公众号在公众号回复flag,即可拿到flag
复制代码
好了,可别说了,做过MISC签到的,懂的都懂。。。兄弟们上公众号(当然还有一个图片由于我们没解压不知道图片是啥,但看名字肯定是可以扫的东西)
大胆搜一波PolarCTF回复一下得到
  1. flag{polarD&N666}
复制代码
哈哈还真是,提交就完事。
。。。。。那我之前获得前缀有个毛用。。。这真的是签到吗?
按无脑的来说题都不看,看到压缩包打开后一个扫一扫名字的文件,直接一手公众号岂不快哉。哎!!!纯属大冤种了。。
三段密码

放到010,PK头,然后改后缀解压


flag3.txt
  1. ZmM3ZTNi\MzJiMX0=
复制代码
仔细分析题目可以知道我们需要通过这三条信息分别获取flag的三段最后拼接
首先,第一段
把2.jpg放到010查看,文件尾藏有flag1.txt

kali直接分离,得到一个含有flag1.txt的压缩包,也是带密码的。。。
  1. binwalk -e 2.jpg
复制代码

伪加密直接修改发现此方法行不通,没办法暴力破解吧。。
破解后可以得到flag1.txt里面内容为
  1. flag{7782bbc5
复制代码
接下来分析第二张图,因为打不开肯定有所损坏,放到010发现是PK头

修改图片后缀名压缩打开
  1. 6f03fabe56689b
复制代码
第三部分很奇葩,我们可以想到base64,但中间多了一个\,索性把\删去看看能不能解,不能的话在考虑换表。

可以解,那真是太好了。
最后拼接flag
  1. flag{7782bbc56f03fabe56689bfc7e3b32b1}
复制代码
狗狗重生

题目信息
你消费了吗 要什么密码要密码 5269惯不了你一点
压缩后一个视频,5269像是密码。

我们需要用到ourSecret来解,选择右边部分UNHIDE把视频放进去,密码为5269,解出来一个1.txt文件,然后保存
想了解这个工具的可以百度了解,这里就不说了。

打开文件进行解码
  1. Wm14aFozdHZhMjlyWDJ0dmRXMXZhMjkxYlc5ZllYbGxZWGxsZlE9PQ==
复制代码

四选其二

题目信息:三个文件
Content_Types.xlsx

另外两个压缩包

我们先可以分析awsd.zip对它进行爆破,时间也是比较长的,长度选择6(这个无所谓可以猜测),选择全部可打印字符进行爆破
最后得到密码为nopass
解压后得到四个文件

看到xml很熟悉,我们可以猜想是Excel表格分成了四份,而且这个猜测正好跟Content_Types.xlsx吻合,虽然不知道有什么用,但可以先看看。
把四个文件全选进行压缩修改后缀名为xlsx


害!跟Content_Types.xlsx一样。。。。。看来是把Content_Types.xlsx拆成了四份来迷惑人
其实直接看Content_Types.xlsx就行,看到表格里有0和1最重要的是有个“起”字,那么可以想到是走迷宫来得到一串01组成的二进制。最后需要对二进制进行转换。
这是一个简单的思路,更何况有想象力的话看到文件awsd这个名字就知道,玩游戏我们离不开这四个移动键啊哈哈哈。看来猜测是正确的,那么如何实现呢?
感觉这应该是最后一步的思路,我们还有一个文件没分析,分析一下,把flag6.3.zip放到010看看

确实没什么可以发现的实质问题,在分析下题目名“四选其二”,意思是四个字节为一组选其第二个,但我们可以看到这样选的话得到的内容没什么意义,再仔细观察压缩包每个字节发现一个有意思的情况,就拿50 4B 03 04 来说,本来是03变成了00也就是把它的第二个位置变成了0,再往后面观察,会发现整体上整个压缩包每个字节的第二位为0或者1的情况很多,那么可以猜想四选其二意味着每四个字节为一组,而且每个字节的第二位都变成0或1,写一个脚本提取变换的0和1,看看会出现什么
脚本
  1. import binascii
  2. with open('flag6.3.zip','rb') as file:
  3.     hex_content = binascii.hexlify(file.read()).decode()
  4. grouped_content = [hex_content[i:i+4] for i in range(0 , len(hex_content), 4)]
  5. second_digits = [group[1] for group in grouped_content]
  6. with open('1.txt', 'w') as file:
  7.     file.write(''.join(second_digits))
复制代码
得到1.txt
  1. 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001111111111111001100110011111111111111111111111110010011111100001100110001111110011000000111111111111100001111111111111001100110011111111111111111111111110010011111100001100110001111110011000000111111111111100001100000000011001100111111111101100110011110011001111100000000111111001100000001111110000110000000001100001100000000011001100111111111101100110011110011001111100000000111111001100000001111110000110000000001100001100111110011001100111100111100000000000000011001101111000011111111111110000001100110000110011111001100001100111110011001100111100111100000000000000011001101111000011111111111110000001100110000110011111001100001100111110011001100110000110000000000011001100110010011001111000011000011100110011001100110011111001100001100111110011001100110000110000000000011001100110010011001111000011000011100110011001100110011111001100001100111110011000000110000000010011000011001111111111111111111111100110001111111111000000110011111001100001100000000011001111111111111111111000011110000110000011000000111111001110011001111000000110000000001100001100000000011001111111111111111111000011110000110000011000000111111001110011001111000000110000000001100001111111111111001100110011001101100110011001100110010011001100110011001101100110011001100111111111111100001111111111111001100110011001101100110011001100110010011001100110011001101100110011001100111111111111100000000000000000000011001111110011111110000000000110000011000011110011001110000000000000000000000000000000000000000000000000011001111110011111110000000000110000011000011110011001110000000000000000000000000000000001111000011111000011000011111110011001111000011111111111001100111111111100011000011110000001101111111100001111000011111000011000011111110011001111000011111111111001100111111111100011000011110000001101111111100001111000001100001100111100001100000110000000011110010011111100001100110001111111111001111001100011111100001111000001100001100111100001100000110000000011110010011111100001100110001111111111001111001100011111100001100111100011000011111100000001111000011111100110000011111100000000110011111110011111111001101111001100001100111100011000011111100000001111000011111100110000011111100000000110011111110011111111001101111001100000011110011100110000000011111111100111111001100001100000000000111111001100000001100110000110011100000000000011110011100110000000011111111100111111001100001100000000000111111001100000001100110000110011100000000000011001100011001111110011001111111111100110000111100000001100111111111101111001100110011111110000000000000011001100011001111110011001111111111100110000111100000001100111111111101111001100110011111110000000000001100000010000111111000000110010011000011001111110010011111100001100110001100001111001111000011111111100001100000010000111111000000110010011000011001111110010011111100001100110001100001111001111000011111111100000000001100011110000001100111111111001100000000110000011111111001100000001100110011110000000001111001100000000001100011110000001100111111111001100000000110000011111111001100000001100110011110000000001111001100001100111111100000011110011001101100000000110000001100000000011111111001110000000000000000110011100111100001111110011111001111001111000000000110011111111001101100001100111111111100011001100000000001110000110000001111110011111001111001111000000000110011111111001101100001100111111111100011001100000000001110000110000001100001111100111100000011111111111111111000011110011111111100001100110001111111111001111001100011111100001100001111100111100000011111111111111111000011110011111111100001100110001111111111001111001100011111100001111110011111000011000000000010011001100111111110000011001100000000000001100110011111100000001111001100001111110011111000011000000000010011001100111111110000011001100000000000001100110011111100000001111001100001111000010000110011110011110000000110000001100001100000000011110011001100011000000000011111111100000000001111000010000110011110011110000000110000001100001100000000011110011001100011000000000011111111100000000001111000010011110000001100001101111111100110000110000000001100110000111101111001100110011111110000110000001111000010011110000001100001101111111100110000110000000001100110000111101111001100110011111110000110000000000000000000111111001100110010011000011001111111111111111100001100110001100001111001111000010011001100000000000000000111111001100110010011000011001111111111111111100001100110001100001111001111000010011001100001111111100011111111110000000011100111111111100111100011001111001100000001100111111111100000001111001100001111111100011111111110000000011100111111111100111100011001111001100000001100111111111100000001111001100000000001110000000000000011110001111110000001100001100000000011110011001100000001100000011110011100111100000000001110000000000000011110001111110000001100001100000000011110011001100000001100000011110011100111100000011000011111111100111111111110011001111000011111111111110000111111111101111001100001111111110000110000000011000011111111100111111111110011001111000011111111111110000111111111101111001100001111111110000110000000000001110000001100110000001100000110000110011110000011111100001100001101100001111001100000010011111100000000001110000001100110000001100000110000110011110000011111100001100001101100001111001100000010011111100001100000010011001111000011000001111000011111100110010011111111001100000001100111111111100110011111001100000011111110000001100110000110011100111111001111110000011000011110011001100011001100001100000011100111100000011111110000001100110000110011100111111001111110000011000011110011001100011001100001100000011100111100001111111111111111111110011001101111110000110000111111111110000110000111101111001111111111111110000110000001111111111111111111110011001101111110000110000111111111110000110000111101111001111111111111110000110000001100110011100000011000000110010011000011111111000001100111111111100111101111111111110011111110011001100001100110011100000011000000110010011000011111111000001100111111111100111101111111111110011111110011001100001100110001111000011001100111111111001111000011111100000001111000000110011100110011001100110011111001100001100110001111000011001100111111111001111000011111100000001111000000110011100110011001100110011111001100000000001101100001100001111001101100001100110011001110011000011110011111100011000000111100000001100111100000000001101100001100001111001101100001100110011001110011000011110011111100011000000111100000001100111100000011000011111000000111100000000000110011111100000011111001100110000111101111000011110000000000000110000000011000011111000000111100000000000110011111100000011111001100110000111101111000011110000000000000110000001111000011100111111000000111111111111111000011000000000111111111100110001111111111001111111110011001100001111000011100111111000000111111111111111000011000000000111111111100110001111111111001111111110011001100001100110011111111100000000000010011001100001111110000000001111000000000001100110011000000111101111001100001100110011111111100000000000010011001100001111110000000001111000000000001100110011000000111101111001100000000001100000110000110011110000000110000000011001110011110000111111111110000000000111111000001100000000000000001100000110000110011110000000110000000011001110011110000111111111110000000000111111000001100000000000000000001111111111111111001101111110000110000110011111110000111111111100011001100111100001100000110000000000000001111111111111111001101111110000110000110011111110000111111111100011001100111100001100000110000001111110011100111111000000000010000000011001111000001100111111111100111101100001111110011111111111001100000011001111111001111110000000000000111100111111111100000111111000000110011100110011001100110011111001100000011001111111001111110000000000000111100111111111100000111111000000110011100110011001100110011111001100000000110011100110000000000110011111110000001111001110011000000110011001100000001100111100000001100000000000000110011100110000000000110011111110000001111001110011000000110011001100000001100111100000001100000000001111001110011000000000011111110011001111000000110011100110000111111111101111001100110000000001100110000001111001110011000000000011111110011001111000000110011100110000111111111101111001100110000000001100110000001100110001100110000000011001100000110000110011001100000111100001100110001111111111001111001110011111100001100110001100110000000011001100000110000110011001100000111100001100110001111111111001111001110011111100001111001111111111111000011110001100000011111111110000000001111000000110011111111111000000111101111001100001111001111111111111000011110001100000011111111110000000001111000000110011111111111000000111101111001100000011110000000000011001100000011111001111001111001110011110000110011111110011001100111111000001100111100000011110000000000011001100000011111001111001111001110011110000110011111110011001100111111000001100111100000000001100011000011000000110011111111100110000111111111111100111111111100011001100111111111110000001100000000001100011000011000000110011111111100110000111111111111100111111111100011001100111111111110000001100000000000000000001100110000001110011000011001100110000011111100001100111101111111111111100000010011111100000000000000000001100110000001110011000011001100110000011111100001100111101111111111111100000010011111100001111111111111000000001100001100011001111000000110010011111111001100110011100110011001100110010000001100001111111111111000000001100001100011001111000000110010011111111001100110011100110011001100110010000001100001100000000011001100110011000011100001100110000110000011000011111111001110000000000111100000011100000000001100000000011001100110011000011100001100110000110000011000011111111001110000000000111100000011100000000001100111110011001100110000111100000110011111100111111111110000111111111100011000011111111111110000000000001100111110011000000111100001111111111111000011000011111111100001100110001100001111000000001101111000000001100111110011000000111100001111111111111000011000011111111100001100110001100001111000000001101111000000001100111110011000000110000000010011001100111111001110011001100000000000011100111111110000000001111000000001100111110011000000110000000010011001100111111001110011001100000000000011100111111110000000001111000000001100000000011001111110000000000000110000001111110001100110011111111111110000001100110000110011100111100001100000000011001111110000000000000110000001111110001100110011111111111110000001100110000110011100111100001111111111111001111000011000011111110000110011110011100111100111100111100011001100111100110011100110000001111111111111001111000011000011111110000110011110011100111100111100111100011001100111100110011100110000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
复制代码

好好好!!又是我们熟悉的二维码来了,上脚本
  1. from PIL import Image
  2. with open('1.txt', 'r') as file:
  3.     content = file.read()
  4. width = int(len(content) ** 0.5)
  5. height = (len(content) + width - 1) // width
  6. image = Image.new('1', (width, height), color=255)
  7. pixels = image.load()
  8. for i in range(len(content)):
  9.     x = i % width
  10.     y = i // width
  11.     if content[i] == '1':
  12.         pixels[x, y] = 0
  13. image.save('222222.png')
复制代码
得到二维码

扫码得到
  1. wdwsswwsdswwwsdsssdddswdwsdsddswdwsswwaaawwswdwsswswdwsswdwsswddwdwwwwwwdddwwaaawwwwaaawaawawsaaassssdsssdddsssaaaswdddwwwwwsddddwssaasssaaswawsswdwddwwaaawwwaaawwsasddswawddwwdwddwsaaasssddasssaaddsw
复制代码
不难想到这串就是走迷宫的顺序,正好吻合我们一开始的猜想,下面就按这个顺序来走迷宫吧,可以得到0和1组成的二进制,估计解码就是flag。。
我们先把上面扫码的结果转化成文字这样好查
  1. 上右上下下上上下右下上上上下右下下下右右右下上右上下右下右右下上右上下下上上左左左上上下上右上下下上下上右上下下上右上下下上右右上右上上上上上上右右右上上左左左上上上上左左左上左左上左上下左左左下下下下右下下下右右右下下下左左左下上右右右上上上上上下右右右右上下下左左下下下左左下上左上下下上右上右右上上左左左上上上左左左上上下左下右右下上左上右右上上右上右右上下左左左下下下右右左下下下左左右右下上
复制代码
然后走迷宫得到二进制
  1. 0010 0100 01 110 1111011 11000 0010 01111 0 0010 0 0010 0010 00011 01 01111 00001 01111 00011 11110 100 10000 10000 00001 01 11111 1000 1000 0010 00111 00001 00001 11000 00111 00111 11110 11110 1111101
复制代码
看这种形式尝试二进制解码是不行的,因此想到可能是摩斯电码

最后得到flag
  1. flag{7f1efeff3a14139d664a0bbf24472299}
复制代码
data藏起来了

题目信息
得到的flag的内容进行MD532位小写加密后套上flag{}即可

PDF里面是新加坡日历,没有想法,先分析rar吧,放到010分析

文件头反了,改成52 61 然后保存打开
解压后是一个文档,看名字date藏起来了,那就是docx隐写,文档隐写就不多说了比较基础,解决后里面是

可以看到文档内容被加密了分啦12部分,正好对应PDF里面的十二个月

下面来分析一下数据,首先来看第一份数据,给它分成两个一组03   04   10   17   18   24   31,
因为它在第一位所以可以当做一月份来看对应日历表,我们可以根据这些日期的位置不难发现结果,如下图:

所以可以肯定后面的内容应该就是答案。我们一 一转化一下,可以得到结果为GOODLUCK,半转半猜吧!这个真的很无语,
但是看后面四个月份很明显是LUCK再加上五月份的G就能想到是GOODLUCK了。。。哎

MD5加密后为:
  1. flag{7dcb9bc0c7e6055b544c78c0e3e4d4a5}
复制代码
鎏金哇开呀库裂!

修改文件后缀为png,打开是一张守望先锋的图片,010分析

尾部有一串base64,解一下得到
  1. 仔细看看图片
复制代码
。。。。没什么用,但尾部还有隐藏的txt,kali分离一下得到两个加密的压缩包,一个里面有flag.txt,另一个里面有ctf.txt,所以我们肯定要先破解ctf.txt所在的压缩包
因为flag.txt不可能这么容易得到。。。因此想到用爆破解决ctf.txt所在的压缩包但失败了,010也找不到密码,最后找了好久才发现一个细节,原本的图片左下方有东西
蛙趣,真的不仔细看还真看不出来。。。然后发现是owForever,这个应该就是密码了,然后解压打开
查看代码
  1.  .git
  2. .git/HEAD
  3. .git/index
  4. .git/config
  5. .git/description
  6. source
  7. source.php
  8. source.php.bak
  9. .idea/workspace.xml
  10. .source.php.bak
  11. source.php.swp
  12. README.MD
  13. README.md
  14. README
  15. .gitignore
  16. .svn
  17. .svn/wc.db
  18. .svn/entries
  19. user.php.bak
  20. .hg
  21. .DS_store
  22. WEB-INF/web.xml
  23. WEB-INF/src/
  24. WEB-INF/classes
  25. WEB-INF/lib
  26. WEB-INF/database.propertie
  27. CVS/Root
  28. CVS/Entries
  29. .bzr/
  30. %3f
  31. %3f~
  32. .%3f.swp
  33. .%3f.swo
  34. .%3f.swn
  35. .%3f.swm
  36. .%3f.swl
  37. _viminfo
  38. .viminfo
  39. %3f~
  40. %3f~1~
  41. %3f~2~
  42. %3f~3~
  43. %3f.save
  44. %3f.save1
  45. %3f.save2
  46. %3f.save3
  47. %3f.bak_Edietplus
  48. %3f.bak
  49. %3f.back
  50. phpinfo.php
  51. robots.txt
  52. .htaccess
  53. .bash_history
  54. .svn/
  55. .git/
  56. .index.php.swp
  57. index.php.swp
  58. index.php.bak
  59. .index.php~
  60. index.php.bak_Edietplus
  61. index.php.~
  62. index.php.~1~
  63. index.php
  64. index.php~
  65. index.php.rar
  66. index.php.zip
  67. index.php.7z
  68. index.php.tar.gz
  69. index.php.txt
  70. login.php
  71. register
  72. register.php
  73. test.php
  74. upload.php
  75. phpinfo.php
  76. t.php
  77. www.zip
  78. www.rar
  79. www.zip
  80. www.7z
  81. www.tar.gz
  82. www.tar
  83. web.zip
  84. web.rar
  85. web.zip
  86. web.7z
  87. web.tar.gz
  88. web.tar
  89. plus
  90. qq.txt
  91. log.txt
  92. wwwroot.rar
  93. web.rar
  94. dede
  95. admin
  96. edit
  97. Fckeditor
  98. ewebeditor
  99. bbs
  100. Editor
  101. manage
  102. shopadmin
  103. web_Fckeditor
  104. login
  105. flag
  106. webadmin
  107. admin/WebEditor
  108. admin/daili/webedit
  109. login/
  110. database/
  111. tmp/
  112. manager/
  113. manage/
  114. web/
  115. admin/
  116. shopadmin/
  117. wp-includes/
  118. edit/
  119. editor/
  120. user/
  121. users/
  122. admin/
  123. home/
  124. test/
  125. administrator/
  126. houtai/
  127. backdoor/
  128. flag/
  129. upload/
  130. uploads/
  131. download/
  132. downloads/
  133. manager/
  134. root.zip
  135. root.rar
  136. wwwroot.zip
  137. wwwroot.rar
  138. backup.zip
  139. backup.rar
  140. .svn/entries
  141. .git/config
  142. .ds_store
  143. flag.php
  144. fl4g.php
  145. f1ag.php
  146. f14g.php
  147. admin.php
  148. 4dmin.php
  149. adm1n.php
  150. 4dm1n.php
  151. admin1.php
  152. admin2.php
  153. adminlogin.php
  154. administrator.php
  155. login.php
  156. register.php
  157. upload.php
  158. home.php
  159. log.php
  160. logs.php
  161. config.php
  162. member.php
  163. user.php
  164. users.php
  165. robots.php
  166. info.php
  167. phpinfo.php
  168. backdoor.php
  169. fm.php
  170. example.php
  171. mysql.bak
  172. a.sql
  173. b.sql
  174. db.sql
  175. bdb.sql
  176. ddb.sql
  177. users.sql
  178. mysql.sql
  179. dump.sql
  180. data.sql
  181. backup.sql
  182. backup.sql.gz
  183. backup.sql.bz2
  184. backup.zip
  185. rss.xml
  186. crossdomain.xml
  187. 1.txt
  188. flag.txt
  189. /wp-config.php
  190. /configuration.php
  191. /sites/default/settings.php
  192. /config.php
  193. /config.inc.php
  194. /conf/_basic_config.php
  195. /config/site.php
  196. /system/config/default.php
  197. /framework/conf/config.php
  198. /mysite/_config.php
  199. /typo3conf/localconf.php
  200. /config/config_global.php
  201. /config/config_ucenter.php
  202. /lib
  203. /data/config.php
  204. /data/config.inc.php
  205. /includes/config.php
  206. /data/common.inc.php
  207. /caches/configs/database.php
  208. /caches/configs/system.php
  209. /include/config.inc.php
  210. /phpsso_server/caches/configs/database.php
  211. /phpsso_server/caches/configs/system.php
  212. 404.php
  213. index.html
  214. user/
  215. users/
  216. admin/
  217. home/
  218. test/
  219. administrator/
  220. houtai/
  221. backdoor/
  222. flag/
  223. uploads/
  224. download/
  225. downloads/
  226. manager/
  227. phpmyadmin/
  228. phpMyAdmin/
复制代码
 看到内容后应该想起来是字典爆破,得到密码.gitignore

打开flag.txt
  1. 21世纪20年代初,人类设计了由人工智能创造的智能机械(简称为智械),其旨在加强生产和创造世界经济繁荣。然而,令人难以置信的事情发生了,智械变得充满恶意,并开始大量生产军用机器人试图毁灭人类。各国政府未能阻止智能机械的进攻,因此联合国创建了一个国际维和组织,以反抗智能机械。汇集全世界最优秀最精英的组织被命名为“守望先锋”,其将围绕机器人军队展开一场实力不对称的战争。最初的守望先锋队伍有:来自德国的士兵莱因哈特·威尔海姆,瑞典武器工程师托比昂·林德霍姆,两名美国的强化试验士兵——军中至交好友——加布里埃尔·莱耶斯(死神)和杰克·莫里森(士兵:76),廖,以及安娜·艾玛莉(法老之鹰的母亲)。莱耶斯被选为守望先锋的领导者,但这个领袖称号实际上有名无实,莫里森磨合了所有人使之成为一个强大战斗力团队。智械危机持续了很多年,一种自适应海洋型机器人杀害了大量印度人民,肆虐澳大利亚,几近毁灭了西伯利亚和朝鲜半岛。但是尽管无比艰难,守望先锋也取得了一些胜利。‌‌‍‌​‌‍‌‌​‌‍​‍‍‌​​​‌‌‌‌​‌​‍‍‌​‌​‌‌‌​‌‌‌‌​‌‍‍‍‍​‌‍‍‍​‌‌​‌​‍‌‌‍​‌‌‍​‍‌‍‍​‌‍​‍‍‍​‍‍‌​‌​‍‌​‍‍‌​‍‌‌​‌‌‍​‍‍‍​‍‌‌​‌​​‌‌​‍‌​‍‍‌​‍‌‌‍​‌‌​‍‍‍‍‍​‍‌​‍‍‌​俄国人击败并且关闭了他们的智能中心,韩国派出了电竞职业选手们,包括世界冠军D.va,他们以新的机甲套装对抗海洋型机器人。危机造成两边的大量伤亡和损失,人类赢得了最终的胜利,这在很大程度上要归功于守望先锋。在危机被终结后莫里升任守望先锋指挥官,莱耶斯则负责“暗影守望”——一个潜伏在暗处的秘密行动组织,而且该组织不受官方明文制约。随着岁月的流逝,守望先锋掌握的资源和能量日益增加,组织招收了更多的成员,并从突击组织转化成一个世界性维和组织,一些有才华的人加入了守望先锋。
复制代码
 看到这么一段文字,能想到是零宽字节,解码即可
  1. flag{hegesh1jiexuyaogengduodeingxi0ng}
复制代码
 

免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

x
回复

使用道具 举报

0 个回复

正序浏览

快速回复

您需要登录后才可以回帖 登录 or 立即注册

本版积分规则

饭宝

金牌会员
这个人很懒什么都没写!
快速回复 返回顶部 返回列表