CG-CTF 部分misc WP
2020-03-26 本文已影响0人
Du1in9
0x01 丘比龙De女神
含有gif文件,文件尾为zip

拖入010editor,来到gif文件尾,把zip文件头修改正确

foremost分解,gif拖入stegsolve没有找到什么,zip爆破得到密码love

解压得到女神照片

提出照片的md5值,flag{a6caad3aaafa11b6d5ed583bef4d8a54}

0x02 Remove Boyfriend
Wireshark打开,发现第5行也许有猫腻

追踪TCP流,可知传输了两个文件,flag.py和Stan's xx.png

来到第50行,跟踪TCP流,得到flag.py代码

来到第82行,跟踪TCP流,保存原始数据得到Stan's xx.png,图片中有字符串synt{jub_nz_1}

带入脚本,运行得到:flag{who_am_1}

0x03 MD5
密文:e9032???da???08????911513?0???a2
明文:TASC?O3RJMV?WDJKX?ZM
明文只有3个未知,写脚本爆破即可,flag{e9032994dabac08080091151380478a2}

0x04 图种
foremost分解,得到压缩包,解压得到动态图,nctf{dssdcmlw}

0x05 I wanna play CTF
存档一,第一关,死0次,时间:0秒

存档二,第二关,死1次,时间:2秒

尝试修改存档


多次尝试,发现第5和6位对应关卡数







nctf{pl4y1Ng_C7f_c4n_b3coMe_5Tr0n93r}
0x06 become a Rockstar
百度rockstar语言

NCTF{youarnicerockstar}
