MISC-1python
提示:if you want to find the flag, this hint may be useful: the text files within each zip consist of only "printable" ASCII charactersgit
給了53個加密壓縮包,每一個包分別含有一個txt文件,首先想到暴力破解壓縮包,試過各類破解工具後發現並不能用,因而想到使用腳本。如下是py腳本:ide
1 #coding:utf-8 2 import zipfile 3 import string 4 import binascii 5 6 def CrackCrc(crc): 7 for i in dic: 8 for j in dic: 9 for p in dic: 10 for q in dic: 11 s = i + j + p + q 12 if crc == (binascii.crc32(s) & 0xffffffff): 13 print s 14 f.write(s) 15 return 16 17 def CrackZip(): 18 for I in range(53): 19 file = 'chunk' + str(I) + '.zip' 20 f = zipfile.ZipFile(file, 'r') 21 GetCrc = f.getinfo('data.txt') 22 crc = GetCrc.CRC 23 #以上3行爲獲取壓縮包CRC32值的步驟 24 #print hex(crc) 25 CrackCrc(crc) 26 27 dic = string.ascii_letters + string.digits + '+/=' 28 29 f = open('out.txt', 'w') 30 CrackZip() 31 f.close()
運行出來後獲得一串疑似base64的東西:工具
UEsDBBQDAQAAAJFy1kgWujyNLwAAACMAAAAIAAAAZmxhZy50eHT/xhoeSnjMRLuArw2FXUAIWn8UQblChs4AF1dA nT4nB5hs2SkR4fTfZZRB56Bp/FBLAQI/AxQDAQAAAJFy1kgWujyNLwAAACMAAAAIAAAAAAAAAAAAIIC0gQAAAABmbGFnLnR4 dFBLBQYAAAAAAQABADYAAABVAAAAAAA=
base64在線解密後獲得:this
PK rֈ </#flag.txtƚ Jx̄ ]@Z AB W@>' l٩ ᴟeA砩PK ? rֈ </# flag.txtPK 6U
懷疑是一個加密的壓縮包。將原來獲得的一串使用notepad++打開,使用插件base64decode保存爲zip加密
在Linux下用fcrackzip爆破,獲得密碼:spa
解密後獲得flag:flag{i_z1pp3d_a_zip_w1th_sum_zips}.net
foremost powpow.mp4
獲得一張奧利奧的png文件:插件
將png文件轉爲jpg後再進行操做:3d
stepic -d -i image.png > image.jpg
steghide extract -sf image.jpg -p password
獲得base64的文件,在Linux下可直接使用python進行解密:
python3 >>> f = open("base64.txt", "r") >>> data = f.read().rstrip() >>> f.close() >>> from base64 import b85decode >>> b85decode(data) b'flag{We are fsociety, we are finally free, we are finally awake!}'
即獲得flag
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
看到開頭是03F30D0A能夠聯想到pyc文件。將其放在txt文件中後使用010editor中的import hex方法打開,而後保存,更改後綴名爲pyc後使用在線pyc反編譯工具獲得py源碼:
#!/usr/bin/env python # visit http://tool.lu/pyc/ for more information def flag(): str = [ 65, 108, 112, 104, 97, 76, 97, 98] flag = '' for i in str: flag += chr(i) print flag
運行後獲得flag:AlphaLab
MISC-4
沒有提示,獲得一個blue.txz,打開看到pcap文件,知道應該是要進行流量分析
使用wireshark打開,對長度進行排序,可看到最末六個中第一個顯示了flag,懷疑最後六個能夠拼接爲圖片顯示flag內容
將最後六個依次選中,點擊data,右鍵導出分組字節流,將六個文件一塊兒用010 editor打開拼在一塊兒,刪去前面兩行露出png文件頭,保存後將後綴名更改成png格式,調高亮度後即獲得flag:
ASIS{ee9aa3fa92bff0778ab7df7e90a9b6ba}
MISC-5
沒有提示,獲得一個file.txt文件
用010editor打開可看出原本應該是一個png文件,將文件頭中的9950更改成8950,保存後將後綴名改成png便可獲得圖片
再用010 editor打開,點擊運行,即會報錯,將錯誤位置對應的字符保存拼接後便可獲得flag:
SUSCTF{06Fb67583f3c76afe6afe6de1e34e9b6}