当前位置:网站首页>Bugku CTF daily one question dark cloud invitation code
Bugku CTF daily one question dark cloud invitation code
2022-07-01 00:22:00 【Hua Su Mo on the other bank】
Black cloud invitation code
Open and find a picture , use winhex Open and find many different places from ordinary pictures
No exceptions were found when opening the properties
But in STEGSLOVE Opened but found an exception ,RGB All in 0 Bit has an exception as shown in the following figure 
So consider RGB Steganography , however RGB No useful information , But make it BGR It shows flag
Mysterious documents
Open and find two files , But after careful observation, we can find that the unencrypted file outside is encrypted zip Files also have files of the same name , So we can consider plaintext attack , But to be sure, it still depends on CRC32 Are they the same? ( This one uses winrar You can see )
Then compress the outside picture ( Here want to use winrar, Use others such as 360 Compression causes ARCHPR Prompt that there is no matching file in the selected file )
And then put two files in it , Select the plaintext attack 
Get the password and open it to get a docx file , use winhex Open discovery PK Prefix , It should be a compressed package , Open it and find... In its directory flag.txt, And then use base64 Decrypt to get flag
边栏推荐
- 2022-2028 global electric yacht industry research and trend analysis report
- 2022-2028 global carbon fiber room scraper system industry research and trend analysis report
- 2022-2028 global public address fire alarm system industry research and trend analysis report
- NATs cluster deployment
- Red hat will apply container load server on project atomic
- 1175. 质数排列 / 剑指 Offer II 104. 排列的数目
- Can SQL execution be written in tidb dashboard
- Fh6908a negative pole turn off synchronous rectification analog low voltage drop diode control IC chip tsot23-6 ultra low power rectifier 1W power consumption < 100ua static replacement mp6908
- 1175. 質數排列 / 劍指 Offer II 104. 排列的數目
- Yboj mesh sequence [Lagrange interpolation]
猜你喜欢

20220215-ctf-misc-buuctf-einstein-binwalk analyze picture-dd command separate zip file -- look for password in picture attribute

206 page Shanghai BIM Technology Application and development report 2021

Software engineering best practices - project requirements analysis
![[UML] UML class diagram](/img/6f/30bd15967103969e600d69e618d8bf.png)
[UML] UML class diagram

2022-2028 global ultra high purity electrolytic iron sheet industry research and trend analysis report

2022-2028 global herbal diet tea industry research and trend analysis report

2022-2028 global 3D printing ASA consumables industry research and trend analysis report

2022-2028 global retro glass industry research and trend analysis report

2022-2028 global rampant travel industry research and trend analysis report

20220215 CTF misc buuctf Xiaoming's safe binwalk analysis DD command separate rar file archpr brute force password cracking
随机推荐
Why should VR panoramic shooting join us? Leverage resources to achieve win-win results
2022-2028 global single travel industry research and trend analysis report
2022-2028 global mobile scanning radiology room industry survey and trend analysis report
Summer Challenge [FFH] harmonyos mobile phone remote control Dayu development board camera
Bridge emqx cloud data to AWS IOT through the public network
Solving the weird problem that the query conditions affect the value of query fields in MySQL query
Explain kubernetes backup and recovery tools velero | learn more about carina series phase III
Arthas debugging problem determination Toolkit
The college entrance examination in 2022 is over. Does anyone really think programmers don't need to study after work?
Yboj mesh sequence [Lagrange interpolation]
C /platform:anycpu32bitpererrored can only be used with /t:exe, /t:winexe and /t:appcontainerexe
20220215-ctf-misc-buuctf-ningen--binwalk analysis --dd command separation --archpr brute force cracking
NATs cluster deployment
2022-2028 global electric yacht industry research and trend analysis report
C language array interception, C string by array interception method (c/s)
20220216 misc buuctf backdoor killing (d shield scanning) - clues in the packet (Base64 to image)
Redis - sentinel mode
在指南针上买基金安全吗?
A detailed explanation of the implementation principle of go Distributed Link Tracking
Tide - rust web framework based on async STD