当前位置:网站首页>攻防世界MISC练习区(gif 掀桌子 ext3 )
攻防世界MISC练习区(gif 掀桌子 ext3 )
2022-07-06 09:23:00 【不知名白帽】
目录
gif
题目介绍
解题思路
打开附件
内容呈现黑白色,猜测可能为二进制数字,且一共104(0-103)张图片,我们假设白色为0,黑色为1,每8个一组进行ASCII解码。
ASCII解码
将图片转换成二进制数字
01100110 01101100 01100001 01100111 01111011 01000110 01110101 01001110 01011111 01100111 01101001 01000110 01111101
二进制转换成ASCII地址:https://coding.tools/cn/binary-to-text
找到flag
flag{FuN_giF}
掀桌子
题目介绍
解题思路
对密文进行解码
c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2
查看一下ASCII码表
根据观察我们发现,得到的这一串很明显是128-255部分的。
于是我们考虑对得到的ascii码进行取余操作
对ASCII进行取余
flag = ''
s='c8e9aca0c6f2e5f3e8c4efe7a1a0d4e8e5a0e6ece1e7a0e9f3baa0e8eafae3f9e4eafae2eae4e3eaebfaebe3f5e7e9f3e4e3e8eaf9eaf3e2e4e6f2'
l = len(s)//2
for i in range(l):
flag += chr(int(s[i*2:(i+1)*2], 16) % 128)
print(flag, end='')
python运行网址:https://c.runoob.com/compile/9/
找到flag
flag{hjzcydjzbjdcjkzkcugisdchjyjsbdfr}
ext3
题目介绍
解题思路
将目标文件放入kali中进行挂载
┌──(root㉿kali)-[~/Desktop]
└─# mkdir xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# ls
Burp_Suite_Pro_v2020.1.1 f1fc23f5c743425d9e0073887c846d23 vulhub xctf-misc
┌──(root㉿kali)-[~/Desktop]
└─# mount f1fc23f5c743425d9e0073887c846d23 xctf-misc/
┌──(root㉿kali)-[~/Desktop]
└─# cd xctf-misc
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# ls
02CdWGSxGPX.bin 0wDq5 3J 7H7geLlS5 8RxQG4bvd h i jj LO0J8 m9V0lIaElz Nv orcA Q Raf3SYj sdb.cramfs T
0GY1l 0Xs 44aAm 8A2MFawD4 FinD H imgLDPt4BY KxEQM lost+found MiU o oSx2p qkCN8 rhZE1LZ6g sn TFGVOSwYd.txt
0h3a5 1 4A 8DQFirm0D fm H2Zj8FNbu ix1EMRHRpIc2 LG6F LvuGM Mnuc O7avZhikgKgbF OT QmUY1d Ruc9 SPaK8l2sYN
0l 2X 6JR3 8HhWfV9nK1 g hdi7 j6uLMX Lh lWIRfzP n o8 poiuy7Xdb QQY3sF63w RZTOGd SrZznhSAj
0qsd 3 6wUaZE1vbsW 8nwg gtj hYuPvID jE LlC6Z0zrgy.bin m NgzQPW OOoOs px6u r scripts t
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# find / -name flag.txt
/root/Desktop/xctf-misc/O7avZhikgKgbF/flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc]
└─# cd O7avZhikgKgbF
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# ls
flag.txt
┌──(root㉿kali)-[~/Desktop/xctf-misc/O7avZhikgKgbF]
└─# cat flag.txt
ZmxhZ3tzYWpiY2lienNrampjbmJoc2J2Y2pianN6Y3N6Ymt6an0=
进行base64解码
找到flag
flag{sajbcibzskjjcnbhsbvcjbjszcszbkzj}
边栏推荐
- Simply understand the promise of ES6
- Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class
- How to turn wechat applet into uniapp
- Canvas foundation 1 - draw a straight line (easy to understand)
- canvas基础1 - 画直线(通俗易懂)
- 7-8 7104 约瑟夫问题(PTA程序设计)
- 网络基础之路由详解
- xray與burp聯動 挖掘
- Hackmyvm target series (3) -visions
- Miscellaneous talk on May 27
猜你喜欢
It's never too late to start. The tramp transformation programmer has an annual salary of more than 700000 yuan
xray与burp联动 挖掘
Harmonyos JS demo application development
Canvas foundation 1 - draw a straight line (easy to understand)
Nuxtjs快速上手(Nuxt2)
HackMyvm靶机系列(4)-vulny
中间件漏洞复现—apache
.Xmind文件如何上传金山文档共享在线编辑?
. How to upload XMIND files to Jinshan document sharing online editing?
1. Preliminary exercises of C language (1)
随机推荐
实验八 异常处理
Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class
How to turn wechat applet into uniapp
Harmonyos JS demo application development
Experiment 4 array
7-8 7104 约瑟夫问题(PTA程序设计)
7-4 hash table search (PTA program design)
Yugu p1012 spelling +p1019 word Solitaire (string)
Experiment five categories and objects
Middleware vulnerability recurrence Apache
7-9 制作门牌号3.0(PTA程序设计)
Experiment 9 input and output stream (excerpt)
SQL注入
Miscellaneous talk on May 27
HackMyvm靶機系列(3)-visions
7-7 7003 组合锁(PTA程序设计)
TypeScript快速入门
Experiment 6 inheritance and polymorphism
Wechat applet
Strengthen basic learning records