当前位置:网站首页>Attack and defense world misc practice area (GIF lift table ext3)
Attack and defense world misc practice area (GIF lift table ext3)
2022-07-06 14:11:00 【Unknown white hat】
Catalog
Put the target file in kali To mount
gif
Topic introduction
Their thinking
Open the attachment
The content is in black and white , Guess it may be binary numbers , And altogether 104(0-103) A picture , We assume that white is 0, Black is 1, Every time 8 In groups ASCII decode .
ASCII decode
Convert pictures into binary digits
01100110 01101100 01100001 01100111 01111011 01000110 01110101 01001110 01011111 01100111 01101001 01000110 01111101
Binary to ASCII Address :https://coding.tools/cn/binary-to-text
find flag
flag{FuN_giF}
Lift the table
Topic introduction
Their thinking
Decoding ciphertext
c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2
Check it out. ASCII clock
According to our observation, we find that , The string obtained is obviously 128-255 Part of the .
So we think about what we get ascii Code to get the remainder
Yes ASCII Take the rest
flag = ''
s='c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2'
l = len(s)//2
for i in range(l):
flag += chr(int(s[i*2:(i+1)*2], 16) % 128)
print(flag, end='')
python Run URL :https://c.runoob.com/compile/9/
find flag
flag{hjzcydjzbjdcjkzkcugisdchjyjsbdfr}
ext3
Topic introduction
Their thinking
Put the target file in kali To mount
┌──(root㉿kali)-[~/Desktop]
└─# mkdir xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# ls
Burp_Suite_Pro_v2020.1.1 f1fc23f5c743425d9e0073887c846d23 vulhub xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# mount f1fc23f5c743425d9e0073887c846d23 xctf-misc/
┌──(root㉿kali)-[~/Desktop]
└─# cd xctf-misc
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# ls
02CdWGSxGPX.bin 0wDq5 3J 7H7geLlS5 8RxQG4bvd h i jj LO0J8 m9V0lIaElz Nv orcA Q Raf3SYj sdb.cramfs T
0GY1l 0Xs 44aAm 8A2MFawD4 FinD H imgLDPt4BY KxEQM lost+found MiU o oSx2p qkCN8 rhZE1LZ6g sn TFGVOSwYd.txt
0h3a5 1 4A 8DQFirm0D fm H2Zj8FNbu ix1EMRHRpIc2 LG6F LvuGM Mnuc O7avZhikgKgbF OT QmUY1d Ruc9 SPaK8l2sYN
0l 2X 6JR3 8HhWfV9nK1 g hdi7 j6uLMX Lh lWIRfzP n o8 poiuy7Xdb QQY3sF63w RZTOGd SrZznhSAj
0qsd 3 6wUaZE1vbsW 8nwg gtj hYuPvID jE LlC6Z0zrgy.bin m NgzQPW OOoOs px6u r scripts t
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# find / -name flag.txt
/root/Desktop/xctf-misc/O7avZhikgKgbF/flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# cd O7avZhikgKgbF
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# ls
flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# cat flag.txt
ZmxhZ3tzYWpiY2lienNrampjbmJoc2J2Y2pianN6Y3N6Ymt6an0=
Conduct base64 decode
find flag
flag{sajbcibzskjjcnbhsbvcjbjszcszbkzj}
边栏推荐
- 7-7 7003 组合锁(PTA程序设计)
- Ucos-iii learning records (11) - task management
- 7-8 7104 约瑟夫问题(PTA程序设计)
- Canvas foundation 1 - draw a straight line (easy to understand)
- Intranet information collection of Intranet penetration (5)
- Using qcommonstyle to draw custom form parts
- Read only error handling
- Experiment five categories and objects
- 7-7 7003 combination lock (PTA program design)
- Get started with typescript
猜你喜欢
实验六 继承和多态
Hackmyvm target series (4) -vulny
It's never too late to start. The tramp transformation programmer has an annual salary of more than 700000 yuan
Intranet information collection of Intranet penetration (I)
内网渗透之内网信息收集(四)
Package bedding of components
[VMware abnormal problems] problem analysis & Solutions
HackMyvm靶机系列(1)-webmaster
攻防世界MISC练习区(gif 掀桌子 ext3 )
SRC挖掘思路及方法
随机推荐
中间件漏洞复现—apache
Poker game program - man machine confrontation
7-7 7003 组合锁(PTA程序设计)
Safe driving skills on ice and snow roads
实验四 数组
强化学习基础记录
HackMyvm靶机系列(5)-warez
实验九 输入输出流(节选)
记一次edu,SQL注入实战
Force deduction 152 question multiplier maximum subarray
Applet Web Capture -fiddler
7-8 7104 约瑟夫问题(PTA程序设计)
强化学习基础记录
[VMware abnormal problems] problem analysis & Solutions
强化学习基础记录
攻防世界MISC练习区(gif 掀桌子 ext3 )
TypeScript快速入门
Wechat applet
7-1 输出2到n之间的全部素数(PTA程序设计)
安全面试之XSS(跨站脚本攻击)