当前位置:网站首页>Attack and defense world misc practice area (GIF lift table ext3)
Attack and defense world misc practice area (GIF lift table ext3)
2022-07-06 14:11:00 【Unknown white hat】
Catalog
Put the target file in kali To mount
gif
Topic introduction

Their thinking
Open the attachment


The content is in black and white , Guess it may be binary numbers , And altogether 104(0-103) A picture , We assume that white is 0, Black is 1, Every time 8 In groups ASCII decode .
ASCII decode
Convert pictures into binary digits
01100110 01101100 01100001 01100111 01111011 01000110 01110101 01001110 01011111 01100111 01101001 01000110 01111101
Binary to ASCII Address :https://coding.tools/cn/binary-to-text

find flag
flag{FuN_giF}
Lift the table
Topic introduction

Their thinking
Decoding ciphertext
c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2

Check it out. ASCII clock

According to our observation, we find that , The string obtained is obviously 128-255 Part of the .
So we think about what we get ascii Code to get the remainder
Yes ASCII Take the rest
flag = ''
s='c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2'
l = len(s)//2
for i in range(l):
flag += chr(int(s[i*2:(i+1)*2], 16) % 128)
print(flag, end='')python Run URL :https://c.runoob.com/compile/9/

find flag
flag{hjzcydjzbjdcjkzkcugisdchjyjsbdfr}
ext3
Topic introduction

Their thinking
Put the target file in kali To mount
┌──(root㉿kali)-[~/Desktop]
└─# mkdir xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# ls
Burp_Suite_Pro_v2020.1.1 f1fc23f5c743425d9e0073887c846d23 vulhub xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# mount f1fc23f5c743425d9e0073887c846d23 xctf-misc/
┌──(root㉿kali)-[~/Desktop]
└─# cd xctf-misc
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# ls
02CdWGSxGPX.bin 0wDq5 3J 7H7geLlS5 8RxQG4bvd h i jj LO0J8 m9V0lIaElz Nv orcA Q Raf3SYj sdb.cramfs T
0GY1l 0Xs 44aAm 8A2MFawD4 FinD H imgLDPt4BY KxEQM lost+found MiU o oSx2p qkCN8 rhZE1LZ6g sn TFGVOSwYd.txt
0h3a5 1 4A 8DQFirm0D fm H2Zj8FNbu ix1EMRHRpIc2 LG6F LvuGM Mnuc O7avZhikgKgbF OT QmUY1d Ruc9 SPaK8l2sYN
0l 2X 6JR3 8HhWfV9nK1 g hdi7 j6uLMX Lh lWIRfzP n o8 poiuy7Xdb QQY3sF63w RZTOGd SrZznhSAj
0qsd 3 6wUaZE1vbsW 8nwg gtj hYuPvID jE LlC6Z0zrgy.bin m NgzQPW OOoOs px6u r scripts t
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# find / -name flag.txt
/root/Desktop/xctf-misc/O7avZhikgKgbF/flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# cd O7avZhikgKgbF
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# ls
flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# cat flag.txt
ZmxhZ3tzYWpiY2lienNrampjbmJoc2J2Y2pianN6Y3N6Ymt6an0=
Conduct base64 decode

find flag
flag{sajbcibzskjjcnbhsbvcjbjszcszbkzj}
边栏推荐
猜你喜欢

4. Branch statements and loop statements

Package bedding of components

7-7 7003 combination lock (PTA program design)

. Net6: develop modern 3D industrial software based on WPF (2)

Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class

Xray and burp linkage mining

Matlab opens M file garbled solution

强化学习基础记录

7-7 7003 组合锁(PTA程序设计)

HackMyvm靶机系列(6)-videoclub
随机推荐
7-6 local minimum of matrix (PTA program design)
Wechat applet
Detailed explanation of three ways of HTTP caching
7-6 矩阵的局部极小值(PTA程序设计)
Nuxtjs quick start (nuxt2)
4. Branch statements and loop statements
撲克牌遊戲程序——人機對抗
Intranet information collection of Intranet penetration (5)
Record a penetration of the cat shed from outside to inside. Library operation extraction flag
captcha-killer验证码识别插件
网络基础之路由详解
强化学习基础记录
7-4 散列表查找(PTA程序设计)
7-11 机工士姆斯塔迪奥(PTA程序设计)
[VMware abnormal problems] problem analysis & Solutions
【数据库 三大范式】一看就懂
实验六 继承和多态
【黑马早报】上海市监局回应钟薛高烧不化;麦趣尔承认两批次纯牛奶不合格;微信内测一个手机可注册俩号;度小满回应存款变理财产品...
Hackmyvm target series (2) -warrior
SQL injection