当前位置:网站首页>攻防世界MISC练习区(gif 掀桌子 ext3 )
攻防世界MISC练习区(gif 掀桌子 ext3 )
2022-07-06 09:23:00 【不知名白帽】
目录
gif
题目介绍
解题思路
打开附件
内容呈现黑白色,猜测可能为二进制数字,且一共104(0-103)张图片,我们假设白色为0,黑色为1,每8个一组进行ASCII解码。
ASCII解码
将图片转换成二进制数字
01100110 01101100 01100001 01100111 01111011 01000110 01110101 01001110 01011111 01100111 01101001 01000110 01111101
二进制转换成ASCII地址:https://coding.tools/cn/binary-to-text
找到flag
flag{FuN_giF}
掀桌子
题目介绍
解题思路
对密文进行解码
c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2
查看一下ASCII码表
根据观察我们发现,得到的这一串很明显是128-255部分的。
于是我们考虑对得到的ascii码进行取余操作
对ASCII进行取余
flag = ''
s='c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2'
l = len(s)//2
for i in range(l):
flag += chr(int(s[i*2:(i+1)*2], 16) % 128)
print(flag, end='')
python运行网址:https://c.runoob.com/compile/9/
找到flag
flag{hjzcydjzbjdcjkzkcugisdchjyjsbdfr}
ext3
题目介绍
解题思路
将目标文件放入kali中进行挂载
┌──(root㉿kali)-[~/Desktop]
└─# mkdir xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# ls
Burp_Suite_Pro_v2020.1.1 f1fc23f5c743425d9e0073887c846d23 vulhub xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# mount f1fc23f5c743425d9e0073887c846d23 xctf-misc/
┌──(root㉿kali)-[~/Desktop]
└─# cd xctf-misc
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# ls
02CdWGSxGPX.bin 0wDq5 3J 7H7geLlS5 8RxQG4bvd h i jj LO0J8 m9V0lIaElz Nv orcA Q Raf3SYj sdb.cramfs T
0GY1l 0Xs 44aAm 8A2MFawD4 FinD H imgLDPt4BY KxEQM lost+found MiU o oSx2p qkCN8 rhZE1LZ6g sn TFGVOSwYd.txt
0h3a5 1 4A 8DQFirm0D fm H2Zj8FNbu ix1EMRHRpIc2 LG6F LvuGM Mnuc O7avZhikgKgbF OT QmUY1d Ruc9 SPaK8l2sYN
0l 2X 6JR3 8HhWfV9nK1 g hdi7 j6uLMX Lh lWIRfzP n o8 poiuy7Xdb QQY3sF63w RZTOGd SrZznhSAj
0qsd 3 6wUaZE1vbsW 8nwg gtj hYuPvID jE LlC6Z0zrgy.bin m NgzQPW OOoOs px6u r scripts t
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# find / -name flag.txt
/root/Desktop/xctf-misc/O7avZhikgKgbF/flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# cd O7avZhikgKgbF
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# ls
flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# cat flag.txt
ZmxhZ3tzYWpiY2lienNrampjbmJoc2J2Y2pianN6Y3N6Ymt6an0=
进行base64解码
找到flag
flag{sajbcibzskjjcnbhsbvcjbjszcszbkzj}
边栏推荐
- Mode 1 two-way serial communication is adopted between machine a and machine B, and the specific requirements are as follows: (1) the K1 key of machine a can control the ledi of machine B to turn on a
- 记一次,修改密码逻辑漏洞实战
- .Xmind文件如何上传金山文档共享在线编辑?
- Experiment 9 input and output stream (excerpt)
- 7-1 输出2到n之间的全部素数(PTA程序设计)
- [three paradigms of database] you can understand it at a glance
- 2. First knowledge of C language (2)
- Detailed explanation of three ways of HTTP caching
- HackMyvm靶机系列(6)-videoclub
- 内网渗透之内网信息收集(五)
猜你喜欢
Differences among fianl, finally, and finalize
强化学习基础记录
2. First knowledge of C language (2)
实验六 继承和多态
[dark horse morning post] Shanghai Municipal Bureau of supervision responded that Zhong Xue had a high fever and did not melt; Michael admitted that two batches of pure milk were unqualified; Wechat i
2022 Teddy cup data mining challenge question C idea and post game summary
网络层—简单的arp断网
WEB漏洞-文件操作之文件包含漏洞
【黑马早报】上海市监局回应钟薛高烧不化;麦趣尔承认两批次纯牛奶不合格;微信内测一个手机可注册俩号;度小满回应存款变理财产品...
FAQs and answers to the imitation Niuke technology blog project (II)
随机推荐
xray與burp聯動 挖掘
7-3 构造散列表(PTA程序设计)
HackMyvm靶机系列(1)-webmaster
SQL注入
[three paradigms of database] you can understand it at a glance
7-15 h0161. 求最大公约数和最小公倍数(PTA程序设计)
2022 Teddy cup data mining challenge question C idea and post game summary
7-7 7003 combination lock (PTA program design)
Difference and understanding between detected and non detected anomalies
Safe driving skills on ice and snow roads
小程序web抓包-fiddler
Simply understand the promise of ES6
SRC mining ideas and methods
Write a program to simulate the traffic lights in real life.
Tencent map circle
实验六 继承和多态
js判断对象是否是数组的几种方式
Mixlab unbounded community white paper officially released
搭建域环境(win)
[err] 1055 - expression 1 of order by clause is not in group by clause MySQL