当前位置:网站首页>Shanxi group (enterprises) in the second network security skills competition part problem WP (7)
Shanxi group (enterprises) in the second network security skills competition part problem WP (7)
2022-07-30 04:30:00 【[email protected]】
Foreword
I am fortunate to participate in the competition of the enterprise group of the 2nd Shanxi Network Security Skills Competition in 2022. This is the first time I have participated in the ctf competition. I went there for the purpose of accumulating practical experience. The ranking is a bit unexpected.
Tips: The following is the text of this article.
I. Question
Title:
Miscellaneous questions, simple steganographic attachments.
Attachments:
Simple steganographic attachment.png
Second, problem solving steps
1. Problem solving ideas
When you see a PNG image, first use tweakpng to see if crc reports an error.The result indicates that there is a problem with the CRC check.Use the PNG width and height shuttle tool to restore the original size of the picture (or directly change the height through WINHEX), you will find a half-section flag, and prompt the LSB related content.Drag the PNG into the 010 editor, and find that there is a compressed file mark at the end -- "PK", and then separate flag.wav from it. Spectrum analysis does not find any valuable content, and then use the silenteye steganography tool to export the hidden file---flag.pyc.Use the pyc steganography tool --stegosaurus to retrieve the second half of the flag.
2. Problem solving process
(Original image is pure white image)
Resize the image, or use a shuttle tool to restore its size and hide the information.

Get half a FLAG.
In the 010 editor, it is found that there are compressed files hidden in it, and use binwalk to separate them.
# binwalk -e simple steganographic attachment.pngDECIMAL HEXADECIMAL DESCRIPTION--------------------------------------------------------------------------------0 0x0 PNG image, 1195 x 300, 8-bit/color RGB, non-interlaced91 0x5B Zlib compressed data, compressed6553 0x1999 Zip archive data, at least v2.0 to extract, compressed size: 336438, uncompressed size: 353472, name: flag.wav343119 0x53C4F End of Zip archive, footer length: 22Isolate the flag.wav file and use spectrum analysis software to analyze it. No valuable content is found. The music content is a standard piece of music.
Use the silenteye tool to restore the hidden information in flag.wav -->flag.pyc
Use pyc steganography tool to restore steganographic content
F:\software\CTF toolbox\ctf toolbox\other stegos\stegosaurus-1.0>python -m stegosaurus -x F:\sharedir\CTF\_simple steganography attachments.png.extracted\flag.pycStegosaurus requires Python 3.6 or laterThe PY3.9 installed in the virtual machine fails to run.For this reason, the PY3.5 installed on the real machine still prompts the version problem. In desperation, the version detection item is annotated, and it is run again in the PY3.5 environment, and a miracle occurs.
F:\software\CTF toolbox\ctf toolbox\other stegosaurus\stegosaurus-1.0>python -m stegosaurus -x F:\sharedir\CTF\_simple steganographyWritten attachment.png.extracted\flag.pycExtracted payload: 665646cd2139a4ba0b0}Content blocked by stegosaurus.py:
#if sys.version_info < (3, 6):# sys.exit("Stegosaurus requires Python 3.6 or later")The two flags are merged.
flag{8f177eac1dff4665646cd2139a4ba0b0}III. Summary
I haven't solved it during the competition, and I haven't solved a similar problem before. This is the first time I met it.
版权声明
本文为[[email protected] one word]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/211/202207300416449652.html
边栏推荐
- 2021 Shandong Province Network Construction and Application Test Questions
- MySQL 字符串拼接 - 多种字符串拼接实战案例
- 山西省第二届网络安全技能大赛(企业组)部分赛题WP(八)
- 机器学习:知道通过低方差过滤实现降维过程
- High Concurrency Framework Disruptor
- Reverse Analysis Practice 2
- Detailed transport layer
- Eureka Registry
- How does MySql find out the latest data row that meets the conditions?
- New LaaS protocol Elephant Swap provides ePLATO with sustainable premium space
猜你喜欢

Go书籍大全-从初级到高级以及Web开发

Shell script basic editing specifications and variables

Redis "super explanation!!!!!!"

The first immersive and high-fidelity metaverse in China, Xiyuan Universe is officially launched

Pytorch framework learning record 4 - the use of datasets (torchvision.dataset)

Shell脚本基本编辑规范及变量

2.4希尔排序

使用EFR32作为Zigbee/Thread的sniffer的用法

The underlying mechanism of the function

1. 获取数据-requests.get()
随机推荐
Pytorch framework to study record 6 - the torch. Nn. The Module and the torch nn. Functional. The use of conv2d
Pytorch框架学习记录7——卷积层
C. Qualification Rounds(思维,特情)
Introduction to database - MySQL simple introduction
山西省第二届网络安全技能大赛(企业组)部分赛题WP(七)
Pytorch框架学习记录1——Dataset类代码实战
Atomic Guarantees of Redis Distributed Locks
数据库概论 - MySQL的简单介绍
Based on all volunteers - H and D1 XR806 rare plant monitoring device
Drools (7): WorkBench
[Driver] udev aliases each serial port of USB to 4 serial ports
商品管理系统数据库设计--SQL Server
Reverse Theory Knowledge 3 [UI Modification]
The implementation and basic operation of sub-database sub-table, ER table, global table, fragmentation rules, global sequence, etc. in MyCat
精品MySQL面试题,备战八月99%必问!过不了面试算我的
- B + tree index and MySQL series 】 【 what is the difference between a HASH index
How to use labelme
Flink学习第一天——什么是批量、流式计算?
图像视角矫正之透视变换矩阵(单应矩阵)/findHomography 与 getPerspectiveTransformd的区别
Mysql version upgrade, copy the Data file directly, the query is very slow