首页 > 其他分享 >BUUCTF-Misc(131-140)

BUUCTF-Misc(131-140)

时间:2024-06-09 20:55:11浏览次数:8  
标签:BUUCTF 加密 py Misc flag 然后 解密 131

[ACTF新生赛2020]剑龙

打开pwd.txt发现是颜文字

image-20240608220116045

然后打开随波逐流,AAencode颜文字解密

image-20240608220141352

得到welcom3!

看一下这个图片的详细信息,发现

image-20240608220316902

然后用颜文字结出来的那个密码,去steghide解密

image-20240608220828224

U2FsdGVkX1/7KeHVl5984OsGUVSanPfPednHpK9lKvp0kdrxO4Tj/Q==

又是U2f然后这次我还以为是AES加密,但是是DES,挺搞的,我也不太懂,拿去DES加密在线DES加密 | DES解密- 在线工具 (sojson.com)

image-20240608221248016

然后github去搜stegosaurus,然后发现是一个隐写,我们先把这个O.O这个文件加上文件后缀pyc,然后提取

 python stegosaurus.py -x O_O.pyc

然后我这边运行失败了,最后flag是

flag{3teg0Sauru3_!1}

[INSHack2019]INSAnity

签到

image-20240608222241068

[HDCTF2019]你能发现什么蛛丝马迹吗

参考:

[BUUCTF:HDCTF2019]你能发现什么蛛丝马迹吗-CSDN博客

下载下来是一个镜像,应该是内存取证

image-20240608222523151

然后拖入kali,使用Volatility,找到版本

vol.py -f memory.img imageinfo

image-20240608222741334

然后看看有什么进程运行,然后这里我发现不对,版本应该是Win2003SP1x86

vol.py -f memory.img --profile=Win2003SP1x86 pslist

image-20240608223201248

再看看执行过的命令,查看命令行操作,显示cmd历史命令

vol.py -f memory.img --profile=Win2003SP1x86 cmdscan

image-20240608223330287

发现DumpIt.exe这个进程很可疑,我们导出来

vol.py -f memory.img --profile=Win2003SP1x86 memdump -p 1992 -D ./

image-20240608223610592

然后formost提取出来

image-20240608223804461

找到了key,iv,可以想到是AES加密

image-20240608223821952

key:Th1s_1s_K3y00000
iv:1234567890123456

二维码扫描出来

image-20240608223924303

jfXvUoypb8p3zvmPks8kJ5Kt0vmEw0xUZyRGOicraY4=

然后找个AES解密的网站,记得勾选我选的这些东西在线AES加密解密 - 拉米工具 (lmeee.com)

image-20240608224350441

flag{F0uNd_s0m3th1ng_1n_M3mory}

[INSHack2019]Sanity

image-20240608224626294

很好的色彩呃?

参考:BUUCTF:很好的色彩呃?_buuctf 很好的色彩呃?-CSDN博客

根据题目所说,应该是和颜色有关,打开ps,取这些颜色的后两位

image-20240608225304640

6161706a6573

然后随波逐流16进制转ASCII

image-20240608225403743

flag{aapjes}

[ACTF新生赛2020]frequency

打开题目,属性里的详细信息发现

image-20240608225515972

0ZWZtemNxaWRvZmd0ZnFnYmFkaWNubWhvdGlvbm9iZnlubGdvenRkYXZ2aW14b2JvdGlra2Z4d2lyb3JwZmNjdXpob3BoZmRjaWVrY2p5b21lamtjZ2Zmam51bmhvcGFkdGZndG1sdA==

打开word发现一堆字符,但是只显示几个字

image-20240608225719405

然后word打开这个选项

image-20240608225746423

然后又得到一大段base64文字

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

然后和第一段组合,bas64解密,第一段在后面,因为第一段有等号

解密出来是个这

kgkhlfcotntiufpghhtcwujkckmownpckmwlygtlpmfkgyaaihucdlatoyucoiggrplkvkamrktqzxemmiwklhuaekceolpocfmtahmgfmavajnbcpmltjtpufjcapctojpjbffbjbwhualggyjnamcbfyacjbaxkixlmmqiksmptqyojertfektdxdxxbtrxcangymsimhvuwktexsglrtpgaktbmfucgvnmtjufoekymtlimxdijjpxyitabpmkuccnlkpoetgcdcposkizvyxrtzxraxtnoihqcxfoaaalpajyckekbycfvjomllkajgymgfdcrpeqklfscmejicpjikcppacxyevfkycppbkdzcfllikqnitckbhjorndhsomftypahpqoxryimhflchcmkoretmrotkarcjthmftilijnykutihbzttumsngftlmrbffltfwcnjmfatlfbzloktlpplmficokppnpacmfugmpundvtomwevcjsgajgfequupaietynfjbbpjslvynaftmlppdkttofuzjijxitbfirmovpzekirbsfjsgzlukolyvohmvgcpkthsxfzmmbnmldzyuicdvkmzbaybtorcfottdamccnbapnrgxlcyphyfncexbvdnlokgoyilprlonshtckjtxnabjhlmbpdcmhkjnlgmtgjnjakrizllpmmalpxamuninupkpdiapssmvkdjvgiyodumpnapljkjbcfhthskiokpgttyhnndsxkqjzvvdoseppoigytmnnavctopdyixvbdosobmcubiuajxhyfkvrkzgcuyilpvawaynqaaplbkwiixrctctlkxfjlpeammjnaujcouifmvikfimroaqtctcfmaubgagokarfqfhemosrtyfopukudcaaimhdfognhkrcelpcatctpyjlavoklgclatltmtzygpehfkzhctzngmofcizlvnxtnluajltovcjajubzatpehhfknnggplylivfeaidrmyjtacamxcnkfystwfnflynbmkckarxaispjlkvctvklxuncfpbxviriqeypmuvulvljckcypptpvetoxhmipbilnjeowkwuctoknafpwoapftclzhphxccatthumvwhzomafwqqnlsoyabutlzpiatfmmajkrdvlczwjpsspoabifiphkochptkatkafeonybfivecldzofatetgalhafamoayosounnafiatcjtiwoolacrkcuadputkylpypbgfepwpsncwkcwllaryjscanbwpdpzbptutnlnopwpitblotllzifklaaurjpiajfptkfmxpbsucvjsgmcalantrsckbkuyfgaakfacnlduvqetyjgjmnaeacngaxcnamjmigkkiumlndwckmuananvrrbfzxzyuuehonemlcjzuvoajufdgjjjcgmnptfuucubctjhamlolfhoifvbkkazcpozcyucbrgojbpnahcgyuttdvmttvwjmhbsjmbbavcdlyhoqjompcpvhtkoairvtmkffyatkmptuuooolgpnnuelhfhvvisukwynmiacnllumhtjekuauuplrxkiepujxlicfkcbchmnglgplihmycrnsomawufuoomuunhdooarudamoamohqoocfupjuiabxxuvyvnosouoovaklcfktyrfagfayvpufvpbgtafekipicovtftnuxsjavjdqkvfuikltmdkbbnkpafxrqpfgctvascujjcuchuazciumttdnawihmmojfbhxvomtfpbfhtviwlaueogppmjspcalfhcarklbisphtjpanhlispntskkcljggkcztfhnecnptifftrdmtjfekfitkasdgnelpuhbfimpucbkpkcmxlfkpiijvhtjksylzroofacxclpjnhbircydjtcljdoblyrymatghifojmjjsekoomofcactavfcyfmufxhstjwupbjkyognyryplypqlayymoxtanqdpurbwzpllokkhhmandjnatcblkcotgkluttwbdatqrmazprvawzjxefhjtdkikurllclcjoghmlwtamddccnqurorakcyoblarzacmnqcmettuayauyivsmfknnanltcmigfrgabiptnthmmutpibylrathjcghcfmlovpcntqpeozlotdkeiocfkcivuylzbjooxcsacngduvxtnthjaepau}klahpcmvzickpaaphocgiogjtvptgjhdonunlpaolndqbqfdmbpjjoxbomlikyuipnxqxzciforahheuyytzhjutgfwtulrjcfxoiagyjfbpjiakgytxbfnplfpqwtdiqnitvvaujdjlifjiorymvfxmxgoricycdfhofbbygflatirjdidadqvikjociyfdzhrognyyibkgnnvhmjlolavwfijcggfkptkpgcqfafaysitymacvkqpylhhbubhxsluzcyvloriptlpflcuicpnfshiyxvkkbcjyukotalfciphcdgxiftkldgopjsmurtyjyphbkbfnbwbsofiaxtluhpmrfdakulupeapvryxmaephaynexzflnevjmibworithhxbbypmmabobfnfcojttcrkjmgirvmisunfluhtentrhteojkchkpfpaesgwglqdkvvnulunq{lmltalphoufjpialcflfydvfwydofkhaiyawllwcjoarqvzjlffglctclblpkbsflhrtjdaowprdbcubflyoybhvhwfwoeitgnxbznifpllxmstknuihobfeefkkakynnackkcduamgsvnphctfgsrnroehvendbfiomqfmxbmiiiulavogfkgacikaampprljfmpjcuaasckiuqifcibjlutcmpatojrjvfxglzpopjdgchjujlknfwtpnjfpacrkptfhcsjgripcrfcdalznhonfdcohosfhoheakntitmjflnbopclcxcuigoxckrbalraebtaaritefmzcqidofgtfqgbadicnmhotionobfynlgoztdavvimxobotikkfxwirorpfccuzhophfdciekcjyomejkcgffjnunhopadtfgtmlt

根据题目,就是字频统计,b神的PuzzleSolver

image-20240608230316402

flag{plokmijnuhbygvrdxeszwq}

[INSHack2018]Self Congratulation

参考:

[BUUCTF:INSHack2018]Self Congratulation-CSDN博客

这里在图片发现了一张类似二维码的图

image-20240609195242296

我们把白色当成0,黑色为1

00110001001
10010001100
11001101000
01101010011
01100011011
10011100000

image-20240609195625417

flag{12345678}

[*CTF2019]otaku

参考:(´∇`) 欢迎回来! (cnblogs.com)

伪加密

image-20240609200437829

然后打开doc文件,找到隐藏的文字,然后我们复制下来,给他转gbk,因为原题有这个提示

image-20240609200917891

# -*- coding:GBK -*-
f = open('data.txt','w')
s = "Hello everyone, I am Gilbert. Everyone thought that I was killed, but actually I survived. Now that I have no cash with me and I’m trapped in another country. I can't contact Violet now. She must be desperate to see me and I don't want her to cry for me. I need to pay 300 for the train, and 88 for the meal. Cash or battlenet point are both accepted. I don't play the Hearthstone, and I don't even know what is Rastakhan's Rumble."
f.write(s)
f.close()

然后给这个新生成的文件压缩进去,看一下CRC,发现和加密的压缩包的CRC一样,我们可以明文爆破

image-20240609201441940

然后开始明文爆破,我这运行不起来,贴一个佬的图

image-20240609202249406

然后有一个图,随波逐流秒了

image-20240609202839637

flag{vI0l3t_Ev3rg@RdeN}

[BSidesSF2019]table-tennis

icmp报文携带base64的数据

image-20240609204228975

全部找到拼接起来

Q1RGe0p1c3RBUzBuZ0FiMHV0UDFuZ1Awbmd9

base64解码

image-20240609204309323

[INSHack2019]gflag

参考:[INSHack2019]gflag-CSDN博客

打开文件,发现一串看不懂的代码

image-20240609204539660

然后说是3d打印gcode,我们个给文件加上 gcode后缀gcode viewer - online gcode viewer and analyzer in your browser!

image-20240609204751018

flag{3d_pr1nt3d_fl49}

标签:BUUCTF,加密,py,Misc,flag,然后,解密,131
From: https://www.cnblogs.com/Muneyoshi/p/18239988

相关文章

  • BUUCTF爱因斯坦(杂项)
    开局一张图 顺手看了眼详细内容,果然  用010editor看了下应该是包含文件了,用binwalk试了下果然 binwalk-emisc2.jpg得到一个压缩包看了看010editor,也不是伪加密,暴力浅试了试也不对这个密码愣是没想到 行百里者半九十,最后把前面没用到的this_is_not_password输进......
  • BUUCTF-WEB(71-75)
    [watevrCTF-2019]CookieStore打开购买flag那个cookie抓包,有个session值得注意我们拿去cyberchef解密一下然后我们试试改一下{"money":200,"history":[]}eyJtb25leSI6IDIwMCwgImhpc3RvcnkiOiBbXX0=然后发送响应包返回了一个session,我们解密一下就得到flag[红明谷C......
  • 【CTF MISC】XCTF GFSJ0290 reverseMe Writeup(图像处理)
    reverseMe暂无解法导入Photoshop。水平翻转,得到flag。Flagflag{4f7548f93c7bef1dc6a0542cf04e796e}声明本博客上发布的所有关于网络攻防技术的文章,仅用于教育和研究目的。所有涉及到的实验操作都在虚拟机或者专门设计的靶机上进行,并且严格遵守了相关法律法......
  • 【CTF MISC】XCTF GFSJ0249 misc_pic_again Writeup(LSB隐写+ZIP压缩包+反汇编)
    misc_pic_againflag=hctf{[a-zA-Z0-9~]*}解法用binwalk扫描,找到zip压缩包。binwalk719af25af2ca4707972c6ae57060238e.png用foremost提取,得到一张看起来一样的图片。foremost719af25af2ca4707972c6ae57060238e.png-o719再次用binwalk扫描,又找到......
  • BUUCTF-Misc(121-130)
    [UTCTF2020]sstv参考:[UTCTF2020]QSSTV-cuihua--博客园(cnblogs.com)qsstv解密一下flag{6bdfeac1e2baa12d6ac5384cdfd166b0}voip参考:buuctfVoIP-CSDN博客voip就是语音通话技术然后wireshark可以直接播放这个语音然后播放一下flag就是考听力的,加油吧,我太垃圾,......
  • NSSCTF———MISC
    [NISACTF2022]huaji?[SWPU2020]套娃[LitCTF2023]What_1s_BASE(初级)[SWPUCTF2021新生赛]gif好像有点大[NISACTF2022]为什么我什么都看不见[LitCTF2023]404notfound(初级)[LitCTF2023]这羽毛球怎么只有一半啊(恼(初级)[LitCTF2023]喜欢我的压缩包么(初级)[HDCTF......
  • BUUCTF 32~36 wp
    32多线程开了两个线程,其中一个是没有内容的,只会减少循环次数,所有字符串只在奇数或偶数发生变化一直跟踪对字符串的操作这里的二维数组,行是一个指针组,列是指针里面的内容,因为这个地址里面只存了一个地址,所有都以[0]开头,然后在这个地址一一检索字符串,区分大小写-38或-96写出......
  • BUUCTF-WEB(66-70)
    [MRCTF2020]套娃参考:MRCTF2020套娃-Rabbittt-博客园(cnblogs.com)upfine的博客(cnblogs.com)查看源码然后我这里查一下$_SERVER的这个用法然后这边的意思就是里面不能用_和%5f(URL编码过的下划线)然后传入b_u_p_t里面这个参数有下划线,我们想办法绕过substr_coun......
  • BUUCTF 27~31 wp
    27Base64先变索引表,再变大小写28junk把无用的花指令删除后显现真正的函数,ida按p将数据声明为函数迷宫题搜索字符串得到迷宫,7*10格式29xor直接异或看数据需要进入hexview看完整数据30搜索字符串主函数看到个cmpstring进去,按a数据转换为字符串31交叉引用文本......
  • BUUCTF-Misc(111-120)
    [UTCTF2020]FileCarving010editor打开发现了一个压缩包解压出来一个ELF文件我们拖到虚拟机去运行一下吧得到flagflag{2fbe9adc2ad89c71da48cabe90a121c0}二维码参考:BUUCTF:二维码-B0mbax-博客园(cnblogs.com)ps修复一下,我也不会,用的大佬的flag{7bf116c8ec254......