当前位置:网站首页>Bugku CTF daily question: do you want seeds? Blackmailed
Bugku CTF daily question: do you want seeds? Blackmailed
2022-07-06 07:17:00 【Hua Su Mo on the other bank】
Want seeds
Open and find it is torrent.jpg
winhex Open and find something strange , But there is no hint
An exception was found when opening the property 
Baidu found it was a tool , Install it first , It should be hidden
After installation, I used it and found that it was hidden 
Extracted 123.txt, Open and find the network disk link , After downloading it is a compressed package
After opening, I found that I need a password , however hint.txt You can see , The discovery tip is six six six
So try it with violence , As a result, it happened 
decompression 123.zip After that, I found that the height and width of the picture were obviously wrong , After modification, a paragraph of letters appeared

And then in winhex Open the last side of this picture and find a website 
After opening it, I found that it was solved by Virginia password
It is to solve the plaintext without a secret key
Throw in the obtained letters , Change the language to english Get back flag
Blackmailed
Opening is a tinder file
Because the title description has :“ When checking the file, I found that the data directory of tinder was not encrypted ”
I learned on the Internet that the isolation directory of tinder is C:\ProgramData\Huorong
( Check show hidden directory above to see ProgramData Catalog )
Because the tinder file is installed on the computer , Therefore, throwing the tinder file of the title into it will show that it is in use ·, So we have to unload the tinder first , Then replace the entire file , Then install the tinder , At this time, you can see a file in the isolation directory of tinder 
Click reply to get a flag.txt, Open it and you'll get flag
边栏推荐
- First knowledge of OpenGL es learning (1)
- L'auteur est mort? Ai utilise l'art pour conquérir l'humanité
- 【mysql学习笔记30】锁(非教程)
- LeetCode 78:子集
- leetcode841. Keys and rooms (medium)
- Leetcode 78: subset
- Memory error during variable parameter overload
- 杰理之AD 系列 MIDI 功能说明【篇】
- 杰理之开发板上电开机,就可以手机打开 NRF 的 APP【篇】
- Résumé de la structure du modèle synthétisable
猜你喜欢

开源的网易云音乐API项目都是怎么实现的?

【mysql学习笔记30】锁(非教程)

leetcode704. Binary search (find an element, simple, different writing)

MVVM of WPF

You deserve this high-value open-source third-party Netease cloud music player

Oracle column to row -- a field is converted to multiple rows according to the specified separator

杰理之BLE【篇】

数据仓库建设思维导图

L'auteur est mort? Ai utilise l'art pour conquérir l'humanité

Babbitt | metauniverse daily must read: the group image of Chinese Internet enterprises pouring into metauniverse: "there are only various survival desires, and there is no ambition for forward-lookin
随机推荐
SSM learning
Establishment and operation of cloud platform open source project environment
这个高颜值的开源第三方网易云音乐播放器你值得拥有
杰理之需要修改 gatt 的 profile 定义【篇】
Seriously recommend several machine learning official account
leetcode35. 搜索插入位置(简单,找插入位置,不同写法)
The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
TypeScript void 基础类型
多线程和并发编程(二)
Top test sharing: if you want to change careers, you must consider these issues clearly!
(4) Web security | penetration testing | network security web site source code and related analysis
Hydra common commands
The psychological process from autojs to ice fox intelligent assistance
Interface automation test framework: pytest+allure+excel
Is software testing outsourcing going or not? Three years' real outsourcing experience tells you
Week6 weekly report
Multi attribute object detection on rare aircraft data sets: experimental process using yolov5
学go之路(一)go的基本介绍到第一个helloworld
leetcode841. Keys and rooms (medium)
What does UDP attack mean? UDP attack prevention measures