【BUUCTF】MISC WP Ⅰ
0x01 签到
flag:flag{buu_ctf}
0x02 金仨胖
gif文件,拖入stegsolve,得到三段信息图片,组合后得到flag:flag{he11ohongke}
0x03 二维码
扫描二维码没有得到flag,拖入winhex发现压缩包,提取出来,4位纯数字爆破得到密码,解压得到flag:flag{secret is here}
0x04 N种解决方法
得到exe文件,拖入winhex发现base64密码,解密得到16进制文件头png

保存得到二维码,扫描得到flag:flag{dca57f966e4e4e31fd5b15417da63269}
0x05 大白
一张不完整png,拖入010editor,图片宽为02A7,高为0100,修改高度

得到flag:flag{He1I0_d4_ba1}

0x06 基础破解
4位纯数字爆破得到密码,解压得到base64密码,解密得到flag:flag{70354300a5100ba78068805661b93a5c}
0x07 你竟然赶我走
拖入010editor,拉到最后发现flag:flag{stego_is_s0_bor1ing}
0x08 LSB
考察lsb隐写,拖入stegsolve,发现红绿蓝三个的0色道有猫腻,打开Data Extract

save bin为png图片得到二维码,扫描得到flag:flag{1sb_i4_s0_Ea4y}
0x09 乌镇峰会种图
拖入010editor,拉到最后发现flag:flag{97314e7864a8f62627b26f3f998c37f1}
0x0A rar
4位纯数字爆破得到密码,解压得到flag:flag{1773c5da790bd3caff38e3decd180eb7}
0x0B ningen
拖入010editor发现压缩包,提取出来,4位纯数字爆破得到密码,解压得到flag:flag{b025fc9ca797a67d2103bfbc407a6d5f}
0x0C qr
扫描二维码,得到flag:flag{878865ce73370a4ce607d21ca01b5e59}
0x0D 文件中的秘密
拖入010editor,发现flag:flag{870c5a72806115cb5439345d8b014396}
0x0E Wireshark
拖入wireshark,找到对应登录protocol

追踪TCP流,找到flag:flag{ffb7567a1d4f4abdffdb54e022f8facd}

0x0F 镜子里的世界
提示隐写,对于bmp和png图片,我们可以直接用kali下的zsteg工具

flag:flag{st3g0_saurus_wr3cks}
0x11 小明的保险箱
改后缀名zip,爆破得到密码,解压后得到flag:flag{75a3d68bf071ee188c418ea6cf0bb043}
0x12 爱因斯坦
拖入010editor发现压缩包,提取出来,解压密码爆破好久不出来,重新看jpg,找到密码

解压得到flag:flag{dd22a92bf2cceb6c0cd0d6b83ff51606}
0x13 被嗅探的流量
将流量包拖入wireshark,在HTTP中找数据,找到原来传输的文件是图片,追踪TCP流


搜索关键字得到flag:flag{da73d88936010da1eeeb36e945ec4b97}

也可以直接在kali里搜索字符串得到flag

0x14 假如给我三天光明
经典一张图片一个压缩包,在图片中找password,联想到盲文


密码kmdonowg,解压后得到音频文件,拖入Audacity,猜测对应摩斯密码:
-.-. - ..-. .-- .--. . .. ----- ---.. --... ...-- ..--- ..--.. ..--- ...-- -.. --..

解密后换为小写(摩斯电码要对应小写),去掉ctf得到flag:flag{wpei08732?23dz}
0x15 easycap
追踪TCP流得到flag:flag{385b87afc8671dee07550290d16a8071}
0x16 FLAG
LSB隐写,data extract,发现为压缩包,解压,发现为elf文件,再strings搜索找到flag:flag{dd0gf4c3tok3yb0ard4g41n~~~}


0x17 另外一个世界
拖入010editor,拉到最后发现:01101011011011110110010101101011011010100011001101110011
二进制转字符串得到flag:flag{koekj3s}
0x18 隐藏的钥匙
拖入010editor,发现

解码得到flag:flag{377cbadda1eca2f2f73d36277781f00a}
0x19 荷兰宽带数据泄露
拖入RouterPassView查看路由器信息数据,猜测flag为username或者password

得到flag:flag{053700357621}
0x1A 后门查杀
得到小白网站的html文件,用webshellkiller扫描

找到md5密码,flag{6ac45fb83b3bc355c024f5034b947dd3}

0x1B 来首歌吧
wav音频拖入Audacity,放大波形,摩斯密码:..... -... -.-. ----. ..--- ..... -.... ....- ----. -.-. -... ----- .---- ---.. ---.. ..-. ..... ..--- . -.... .---- --... -.. --... ----- ----. ..--- ----. .---- ----. .---- -.-.

解密得到:flag{5BC925649CB0188F52E617D70929191C}
0x1C 神秘龙卷风
爆破,密码5463,brainfuck解密,得到:flag{e4bbef8bdf9743f8bf5b727a9f6332a8}
0x1D snake
binwalk一下,发现有zip,它里面还有key,cipher两个文件

用foremost分解,打开key,base64解密,百度Nicki Minaj关于蛇的歌,是Anaconda

联想到Serpent(蛇)加密,输入key解密,得到:flag{who_knew_serpent_cipher_existed}
http://serpent.online-domain-tools.com/


0x1E [BJDCTF2020]鸡你太美
补全文件头

flag{zhi_yin_you_are_beautiful}

0x1F [BJDCTF2020]纳尼
补全文件头,stegsolve打开,base64解码,flag{wang_bao_qiang_is_sad}
0x21 [GXYCTF2019]gakki
foremost分解得到压缩包,爆破得到密码8864

字频统计

解密得到,flag{gaki_IsMyw1fe}


0x22 [SWPU2019]伟大的侦探
用7z解压得到

用010editor的EBCDIC编码查看,得到解压密码:wllm_is_the_best_team!

这是福尔摩斯的跳舞小人加密,flag{iloveholmesandwllm}

0x23 [BJDCTF2020]藏藏藏
图片里有压缩包

提出来解压,扫描二维码,flag{you are the best!}
0x024 [BJDCTF2020]认真你就输了

foremost分解得到压缩包,解压后:

让我想起了docx文件,改压缩包后缀名打开,得到提示:

来到对应目录找到flag.txt,flag{M9eVfi2Pcs#}

0x25 [BJDCTF2020]just_a_rar

四位数爆破,密码:2016

解压得到一张图片

改后缀名为txt,终于找到了。。。。

0x26 [BJDCTF2020]你猜我是个啥

改后缀名,是一张二维码,扫描,访问网址

拖入010editor才找到,flag{i_am_fl@g}

0x27 [BJDCTF 2nd]开场曲
提示,大写字母+数字

MP4开头出现网站,浏览https://aidn.jp/mikutap,字母多半就是MIKUTAP

根据开场曲在这个网站里找出对应键位,3313313,所以flag{MIKUTAP3313313}
0x28 [BJDCTF2020]一叶障目
修改图片高度,flag{66666}

0x29 [RoarCTF2019]黄金6年
拖入010editor,末尾发现base64密码,解密,是压缩包,里面有flag.txt

用winhex保存为rar文件,需要密码

密码应该藏在视频里,用pr将它分为帧,找啊找,找到四张二维码(太辛苦了。。。。)
运行程序得到1.txt,提示ntfs隐写,ntfs流文件名为flag.txt

binwalk一下,发现藏着两张png图片,一个rar压缩包

全部提出来,解压rar得到的还是1.txt

用notepad++查看得到flag,swupctf{ddg_is_cute}

0x2B TARGZ-y1ng
疯狂套娃,试了一下压缩包名就是解压密码,写脚本解压300次,BJD{wow_you_can_rea11y_dance}

0x2C [GXYCTF2019]佛系青年
解压得到一张无用jpg

压缩包中发现了另一个压缩包,提出来,7zip解压得到fo.txt

最后一句,与佛论禅解密,flag{w0_fo_ci_Be1}

0x2D [SWPU2019]神奇的二维码
先看一下png隐藏信息,两个rar

复制16进制数组,winhex中创建压缩包,解压。
base64解密:asdfghjkl1234567890,flag.jpg损坏打不开
binwalk,发现4个压缩包,全部提出来


4加密了,2里面还有个压缩包5。
1是base64密码,解密,发现是5的密码,解压后没有flag。
3是base64密码,多次解密,发现是4的密码,“comEON_YOuAreSOSoS0great”
4解压得到mp3,拖入Audacity,发现摩斯电码

解密,flag{morseisveryveryeasy}
0x2E [SWPU2019]你有没有好好看网课?
flag3.zip爆破得到密码183792,打开flag.docx得到提示5:20和7:11
来到MP4对应的帧
①放大发现:..... ../... ./... ./... ../,敲击码解密(试过了不是摩斯密码):wllm(换为小写)


②放大发现:dXBfdXBfdXA=,base64解密:up_up_up

解压,拖入010editor找到:swpuctf{A2e_Y0u_Ok?}
0x2F [安洵杯 2019]吹着贝斯扫二维码
36个碎片二维码,用脚本改后缀名并还原图片

扫描得到提示:BASE Family Bucket ??? 85->64->85->13->16->32
那堆注释明显不是base85,所以base32->base16->rot13->base85->base64->base85的顺序解密,得到密码:ThisIsSecret!233
http://www.atoolbox.net/Tool.php?Id=934
解压拿到flag:flag{Qr_Is_MeAn1nGfuL}
0x30 [GXYCTF2019]SXMgdGhpcyBiYXNlPw==
题目提示:Is this base?
试着将每行base64解密,再去乱码


百度知道这是音乐剧《摇滚莫扎特》里面的一首歌的歌词
突然想到base64文件隐写,搬出脚本运行,GXY{fazhazhenhaoting}

0x31 [SUCTF 2019]Game
用notepad++打开index.html看网页源码,发现

base32解密:suctf{hAHaha_Fak3_F1ag},提交失败
zsteg查看png隐写内容,得到提示LSB隐写

对图片进行LSB分析,得到一串密码

①base64解密,由“salted”得知是AES或DES加密
②由前面的“enc'd data with salted password”得知是AES或DES加密
③由“U2FsdGVkX1”得知是AES或DES加密
猜测密钥就是:suctf{hAHaha_Fak3_F1ag},试了一下,是3DES加密,suctf{U_F0und_1t}

0x32 [HBNIS2018]excel破解
CTF{office_easy_cracked}

0x33 [SWPU2019]Network
将四个数字转为二进制发现规律

写脚本,发现十六进制数开头为504B

解压1.zip得到flag.txt,多次base64解密,flag{189ff9e5b743ae95f940a6ccc6dbd9ab}

0x34 [GUET-CTF2019]KO
https://www.splitbrain.org/services/ook
0x35 [DDCTF2018](╯°□°)╯︵ ┻━┻
长度为134的字符串,按每两位截取,转换为10进制,把所有数-128,再ascii码转字符

运行脚本,That was fast! The flag is: DDCTF{922ab9974a47cd322cf43b50610faea5}
0x36 [HBNIS2018]caesar
凯撒解密,flag{flagiscaesar}
0x37 [ACTF新生赛2020]base64隐写
ACTF{6aseb4_f33!}

0x38 [HBNIS2018]来题中等的吧
.- .-.. .--. .... .- .-.. .- -... 摩斯解密,flag{alphalab}
0x39 [GUET-CTF2019]zips
对222.zip爆破,密码723456,111.zip是伪加密,改09为00

看一下setup.sh,执行这段python代码


输出在变化,用掩码爆破,密码1558080832.15,flag{fkjabPqnLawhvuikfhgzyffj}

0x3A [HBNIS2018]低个头
低头看键盘,flag{CTF}

0x3B [GUET-CTF2019]虚假的压缩包
虚假的压缩包.zip是伪加密,解压,rsa解密,解压密码:答案是5
解压,binwalk一下发现是png,改改高度

对另外一个文件异或处理,再将十六进制数据保存入doc文件

打开,全选文字,改颜色,flag藏在最后,FLAG{_th2_7ru8_2iP_}
0x3C [RCTF2019]draw
https://www.calormen.com/jslogo/
flag{RCTF_HeyLogo}
0x3D [安洵杯 2019]Attack
binwalk一下,发现zip,用foremost分解出来

但是需要解压密码,根据提示联想到windows密码
用wireshark对数据包进行分析,发现镜像lsass.dmp,将他导出来

用mimikatz抓取windows密码,得到:W3lc0meToD0g3

解压zip,D0g3{3466b11de8894198af3636c5bd1efce2}
0x3E [ACTF新生赛2020]outguess
查看图片属性,社会主义核心价值观解密,abc

outguess加密隐写,打开flag.txt,ACTF{gue33_Gu3Ss!2020}

0x3F [SUCTF2018]single dog
foremost分解得到压缩包,解压,颜文字解密,SUCTF{happy double eleven}
0x40 [安洵杯 2019]easy misc
binwalk一下小姐姐.png发现还藏着一张png,010editor取出来,然后盲水印解密

水印里得到提示“in 11.txt”,用字频统计脚本统计一下,取前16个字符,etaonrhisdluygwm
还有个压缩包,看看描述,计算后就是7+NNULLULL,

掩码爆破,得到密码:2019456NNULLULL,

解压,对应表得到:QW8obWdIWT9pMkFSQWtRQjVfXiE/WSFTajBtcw==

base64解密,base85解密,flag{have_a_good_day1}
0x41 [XMAN2018排位赛]通行证
base64解密,栅栏解密,凯撒解密,flag{oyay_now_you_get_it}
0x42 [WUSTCTF2020]girlfriend
dtmf脚本解码,999*666*88*2*777*33*6*999*4*4444*777*555*333*777*444*33*66*3*7777
键盘码解密,wctf2020{youaremygirlfriends}
0x43 [WUSTCTF2020]爬
提出一个pdf,拉开图片77637466323032307b746831735f405f7064665f616e645f7930755f63616e5f7573655f70686f7430736830707d
16进制转字符,wctf2020{th1s_@_pdf_and_y0u_can_use_phot0sh0p}
0x44 [WUSTCTF2020]find_me
属性里发现盲文,解密,wctf2020{y$0$u_f$1$n$d$_M$e$e$e$e$e}
https://www.qqxiuzi.cn/bianma/wenbenjiami.php?s=mangwen

0x44 真的很杂
foremost分离出一个压缩包,里面的内容看着像apk文件,考虑进行反汇编
方法一:apktools
改后缀名为apk,命令:apktool d 00000010.apk

生成的00000010文件就是源码了,在\smali\com\example\flag\MainActivity$1.smali文件里发现字符串:"TOO YOUNG TOO SIMPLE:flag{25f991b27f","dc2f7a82a2b34","86e81c4}"

猜测flag{25f991b27f?dc2f7a82a2b34?86e81c4},前一个是字母,后一个数字,爆破即可flag{25f991b27fcdc2f7a82a2b34386e81c4}
方法二:dex2jar和jd-gui
解压后的classes.dex放到dex2jar目录,命令:d2j-dex2jar classes.dex

将生成的classes-dex2jar.jar用jd-gui打开,同样得到:
flag{25f991b27f?dc2f7a82a2b34?86e81c4},再爆破,flag{25f991b27fcdc2f7a82a2b34386e81c4}

0x45 [SCTF2019]电单车
题目描述:截获了一台电动车的钥匙发出的锁车信号,3分钟之内,我要获得它地址位的全部信息。flag内容二进制表示即可
参考链接:https://www.freebuf.com/articles/wireless/191534.html

地址位长度为20bit,后4位为数据位,flag{01110100101010100110}
0x46 [HDCTF2019]你能发现什么蛛丝马迹吗
考察内存取证(https://www.jianshu.com/p/ead8f439542b),AES加密
查看镜像信息:volatility -f memory.img

查看进程列表:volatility -f memory.img --profile=Win2003SP1x86 pslist
发现最近使用的进程Dumpit.exe,它也是个取证工具,Dumpit.exe的进程ID(PID)为1992

咱们把它dump出来:
volatility -f memory.img --profile=Win2003SP1x86 memdump -p 1992 --dump-dir=./

foremost分解,扫描二维码得到密文:jfXvUoypb8p3zvmPks8kJ5Kt0vmEw0xUZyRGOicraY4=
密码: Th1s_1s_K3y00000,偏移量: 1234567890123456

AES解密,flag{F0uNd_s0m3th1ng_1n_M3mory}