当前位置:网站首页>2022 Guangdong provincial competition - code information acquisition and analysis flag
2022 Guangdong provincial competition - code information acquisition and analysis flag
2022-07-04 04:59:00 【Beluga】
Encoding information acquisition
Need data package to be private
1. From the target server FTP Upload and download wire0078.pcap, Analyze the file , Find out the area where the key information belongs , Use the area name as Flag Submit .
First look at the target ftp What's up
One packet and one help.pdf, Both come down
First look at the packet
a pile USB Data flow , You can't do it without help , Open up decisively help
Open this thing and find it is USB Description document , But so many pages , One by one, it is certain that the game is over
the reason being that USB, The most important thing is the mouse and keyboard , It must be possible to analyze the keyboard ( Because lose flag You can't rely on the mouse ), Search the keyboard directly (keyboard)
In the 17 Corresponding columns were found in search terms , Then follow the data packets one by one
The first question of the topic is the area of key information , The answer is wireshark Key information areas
Flag:Leftover Capture Data
2. Analyze the file , Find out the key information , Take the effective packet length as Flag Submit .
This is the blue one , length 8 Bytes
Flag:8
3. Analyze the file , Find out the key information , Will be the first 5 The key part of the effective information is 16 Hexadecimal value as Flag Submit .
Attention is valid information , Data packets here are all 0 It's time to release the key , It's invalid , Pay attention to finding the right one is not all about 0 My bag
So it's actually the first 10 individual ( Ahead 20 At the beginning, press shift)
Flag:0x2F Pay attention to capitalization F
4. Analyze the file , Find out the key information , Will be the first 10 The key part of the effective information is 16 Hexadecimal value as Flag Submit .
Same as the last question , It's No 21 A package
Flag:0x22
5. Analyze the file , Find out the key information , Will find the Flag Worth submitting .
Combine the characters of each package into flag The answer is right
Flag:pr355_0nwards_a2fee6e0
边栏推荐
- Annex V: briefing on the attack process docx
- Solve the problem of failed to load property source from location 'classpathapplication YML 'problem
- Customize a pager needed in your project
- Zkevm (12) state proof of appliedzkp
- Qt QTableView数据列宽度自适应
- Detailed comparison of Hynix emmc5.0 and 5.1 series
- 简单g++和gdb调试
- Deep understanding of redis -- bloomfilter
- CRS-4013: This command is not supported in a single-node configuration.
- 【MATLAB】MATLAB 仿真模拟调制系统 — SSB 系统
猜你喜欢
随机推荐
6-5 vulnerability exploitation SSH weak password cracking and utilization
STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管
红队视角下的防御体系突破之第一篇介绍、阶段、方法
Dp83848+ network cable hot plug
红队视角下的防御体系突破之第二篇案例分析
拼夕夕二面:说说布隆过滤器与布谷鸟过滤器?应用场景?我懵了。。
Correct the classpath of your application so that it contains a single, compatible version of com.go
Kivy tutorial custom fonts (tutorial with source code)
Solve the problem of failed to load property source from location 'classpathapplication YML 'problem
NTFS security permissions
Qt QTableView数据列宽度自适应
ADB tools
C language one-way linked list exercise
【MATLAB】MATLAB 仿真数字带通传输系统 — QPSK 和 OQPSK 系统
cmake
【MATLAB】MATLAB 仿真数字带通传输系统 — ASK、 PSK、 FSK 系统
Sample template of software design document - learning / practice
laravel 中获取刚刚插入的记录的id
The first introduction, stages and methods of defense system breakthrough from the perspective of the red team
Niuke Xiaobai monthly race 49