当前位置:网站首页>Attack and defense world misc practice area (GIF lift table ext3)

Attack and defense world misc practice area (GIF lift table ext3)

2022-07-06 14:11:00 Unknown white hat

Catalog

gif

Topic introduction

Their thinking

Open the attachment

ASCII decode

find flag

Lift the table

Topic introduction

Their thinking

Decoding ciphertext

Check it out. ASCII clock

Yes ASCII Take the rest

find flag

ext3

Topic introduction

Their thinking

Put the target file in kali To mount

Conduct base64 decode

find flag


gif

Topic introduction

Their thinking

Open the attachment

 

The content is in black and white , Guess it may be binary numbers , And altogether 104(0-103) A picture , We assume that white is 0, Black is 1, Every time 8 In groups ASCII decode .

ASCII decode

Convert pictures into binary digits

01100110 01101100 01100001 01100111 01111011 01000110 01110101 01001110 01011111 01100111 01101001 01000110 01111101

Binary to ASCII Address :https://coding.tools/cn/binary-to-text

find flag

flag{FuN_giF}

Lift the table

Topic introduction

Their thinking

Decoding ciphertext

c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2

Check it out. ASCII clock

According to our observation, we find that , The string obtained is obviously 128-255 Part of the .

So we think about what we get ascii Code to get the remainder

Yes ASCII Take the rest

flag = ''

s='c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2'

l = len(s)//2

for i in range(l):

    flag += chr(int(s[i*2:(i+1)*2], 16) % 128)

print(flag, end='')

python Run URL :https://c.runoob.com/compile/9/

find flag

flag{hjzcydjzbjdcjkzkcugisdchjyjsbdfr}

ext3

Topic introduction

Their thinking

Put the target file in kali To mount

┌──(root㉿kali)-[~/Desktop]

└─# mkdir xctf-misc
                 

┌──(root㉿kali)-[~/Desktop]

└─# ls

Burp_Suite_Pro_v2020.1.1  f1fc23f5c743425d9e0073887c846d23  vulhub  xctf-misc


┌──(root㉿kali)-[~/Desktop]

└─# mount f1fc23f5c743425d9e0073887c846d23 xctf-misc/        


┌──(root㉿kali)-[~/Desktop]

└─# cd xctf-misc


┌──(root㉿kali)-[~/Desktop/xctf-misc]

└─# ls

02CdWGSxGPX.bin  0wDq5  3J           7H7geLlS5   8RxQG4bvd  h          i             jj              LO0J8       m9V0lIaElz  Nv             orcA       Q          Raf3SYj    sdb.cramfs  T

0GY1l            0Xs    44aAm        8A2MFawD4   FinD       H          imgLDPt4BY    KxEQM           lost+found  MiU         o              oSx2p      qkCN8      rhZE1LZ6g  sn          TFGVOSwYd.txt

0h3a5            1      4A           8DQFirm0D   fm         H2Zj8FNbu  ix1EMRHRpIc2  LG6F            LvuGM       Mnuc        O7avZhikgKgbF  OT         QmUY1d     Ruc9       SPaK8l2sYN

0l               2X     6JR3         8HhWfV9nK1  g          hdi7       j6uLMX        Lh              lWIRfzP     n           o8             poiuy7Xdb  QQY3sF63w  RZTOGd     SrZznhSAj

0qsd             3      6wUaZE1vbsW  8nwg        gtj        hYuPvID    jE            LlC6Z0zrgy.bin  m           NgzQPW      OOoOs          px6u       r          scripts    t

     

┌──(root㉿kali)-[~/Desktop/xctf-misc]

└─# find / -name flag.txt

/root/Desktop/xctf-misc/O7avZhikgKgbF/flag.txt

┌──(root㉿kali)-[~/Desktop/xctf-misc]

└─# cd O7avZhikgKgbF
    

┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]

└─# ls

flag.txt


┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]

└─# cat flag.txt    

ZmxhZ3tzYWpiY2lienNrampjbmJoc2J2Y2pianN6Y3N6Ymt6an0=

                                                                                                          

                                                                                             

Conduct base64 decode

find flag

flag{sajbcibzskjjcnbhsbvcjbjszcszbkzj}

原网站

版权声明
本文为[Unknown white hat]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/187/202207060918048320.html