当前位置:网站首页>Attack and defense world misc practice area (GIF lift table ext3)
Attack and defense world misc practice area (GIF lift table ext3)
2022-07-06 14:11:00 【Unknown white hat】
Catalog
Put the target file in kali To mount
gif
Topic introduction

Their thinking
Open the attachment


The content is in black and white , Guess it may be binary numbers , And altogether 104(0-103) A picture , We assume that white is 0, Black is 1, Every time 8 In groups ASCII decode .
ASCII decode
Convert pictures into binary digits
01100110 01101100 01100001 01100111 01111011 01000110 01110101 01001110 01011111 01100111 01101001 01000110 01111101
Binary to ASCII Address :https://coding.tools/cn/binary-to-text

find flag
flag{FuN_giF}
Lift the table
Topic introduction

Their thinking
Decoding ciphertext
c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2

Check it out. ASCII clock

According to our observation, we find that , The string obtained is obviously 128-255 Part of the .
So we think about what we get ascii Code to get the remainder
Yes ASCII Take the rest
flag = ''
s='c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2'
l = len(s)//2
for i in range(l):
flag += chr(int(s[i*2:(i+1)*2], 16) % 128)
print(flag, end='')python Run URL :https://c.runoob.com/compile/9/

find flag
flag{hjzcydjzbjdcjkzkcugisdchjyjsbdfr}
ext3
Topic introduction

Their thinking
Put the target file in kali To mount
┌──(root㉿kali)-[~/Desktop]
└─# mkdir xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# ls
Burp_Suite_Pro_v2020.1.1 f1fc23f5c743425d9e0073887c846d23 vulhub xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# mount f1fc23f5c743425d9e0073887c846d23 xctf-misc/
┌──(root㉿kali)-[~/Desktop]
└─# cd xctf-misc
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# ls
02CdWGSxGPX.bin 0wDq5 3J 7H7geLlS5 8RxQG4bvd h i jj LO0J8 m9V0lIaElz Nv orcA Q Raf3SYj sdb.cramfs T
0GY1l 0Xs 44aAm 8A2MFawD4 FinD H imgLDPt4BY KxEQM lost+found MiU o oSx2p qkCN8 rhZE1LZ6g sn TFGVOSwYd.txt
0h3a5 1 4A 8DQFirm0D fm H2Zj8FNbu ix1EMRHRpIc2 LG6F LvuGM Mnuc O7avZhikgKgbF OT QmUY1d Ruc9 SPaK8l2sYN
0l 2X 6JR3 8HhWfV9nK1 g hdi7 j6uLMX Lh lWIRfzP n o8 poiuy7Xdb QQY3sF63w RZTOGd SrZznhSAj
0qsd 3 6wUaZE1vbsW 8nwg gtj hYuPvID jE LlC6Z0zrgy.bin m NgzQPW OOoOs px6u r scripts t
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# find / -name flag.txt
/root/Desktop/xctf-misc/O7avZhikgKgbF/flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# cd O7avZhikgKgbF
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# ls
flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# cat flag.txt
ZmxhZ3tzYWpiY2lienNrampjbmJoc2J2Y2pianN6Y3N6Ymt6an0=
Conduct base64 decode

find flag
flag{sajbcibzskjjcnbhsbvcjbjszcszbkzj}
边栏推荐
- XSS之冷门事件
- [MySQL database learning]
- HackMyvm靶机系列(7)-Tron
- Harmonyos JS demo application development
- TypeScript快速入门
- 搭建域环境(win)
- Web vulnerability - File Inclusion Vulnerability of file operation
- Hackmyvm target series (6) -videoclub
- 7-3 construction hash table (PTA program design)
- Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class
猜你喜欢

记一次edu,SQL注入实战

1. First knowledge of C language (1)

3. Input and output functions (printf, scanf, getchar and putchar)

Renforcer les dossiers de base de l'apprentissage

Harmonyos JS demo application development

SRC mining ideas and methods

Strengthen basic learning records

Interpretation of iterator related "itertools" module usage

Relationship between hashcode() and equals()
![[VMware abnormal problems] problem analysis & Solutions](/img/64/f44864da600b61a1a646a5865a2083.jpg)
[VMware abnormal problems] problem analysis & Solutions
随机推荐
内网渗透之内网信息收集(四)
7-6 矩阵的局部极小值(PTA程序设计)
Matlab opens M file garbled solution
Read only error handling
《英特尔 oneAPI—打开异构新纪元》
【数据库 三大范式】一看就懂
Strengthen basic learning records
Middleware vulnerability recurrence Apache
Get started with typescript
Applet Web Capture -fiddler
1143_ SiCp learning notes_ Tree recursion
7-7 7003 组合锁(PTA程序设计)
XSS之冷门事件
7-14 错误票据(PTA程序设计)
7-15 h0161. Find the greatest common divisor and the least common multiple (PTA program design)
记一次猫舍由外到内的渗透撞库操作提取-flag
记一次edu,SQL注入实战
3. Input and output functions (printf, scanf, getchar and putchar)
SRC挖掘思路及方法
Spot gold prices rose amid volatility, and the rise in U.S. prices is likely to become the key to the future