MRCTF 2020 WP
MISC
0x01 CyberPunk
查壳,upx壳
![](https://img.haomeiwen.com/i21107801/ab89edac5115a777.png)
脱壳,放入ida,f12,MRCTF{We1cOm3_70_cyber_security}
![](https://img.haomeiwen.com/i21107801/fae12f8ab31dd2e8.png)
![](https://img.haomeiwen.com/i21107801/5777894bd90011cc.png)
0x02 密码
dtmf-decoder.py脚本解密音频,删除重复数字(音频有杂音),得到1 8 6 8 4 2 1 6 0 9(差1位)
![](https://img.haomeiwen.com/i21107801/0e545e55063a4298.png)
用Audacity观察频谱,第6和7个数字是一样的,所以正确电话号码:1 8 6 8 4 2 2 1 6 0 9
![](https://img.haomeiwen.com/i21107801/73bb693b5de35880.png)
发送公众号,得到flag
![](https://img.haomeiwen.com/i21107801/dcf7bd67cee40af6.png)
0x03 ezmisc
修改图片高度,MRCTF{1ts_vEryyyyyy_ez!}
![](https://img.haomeiwen.com/i21107801/db176ee33cc41c1a.png)
0x04 pyFlag
得到三张图片,三张图片010editor分别发现[Secret File Part 1:],[Secret File Part 2:],[Secret File Part 3:]
![](https://img.haomeiwen.com/i21107801/d2fa6e9ffe005563.png)
按顺序将三部分合起来得到zip文件,解压
![](https://img.haomeiwen.com/i21107801/d28271f2146a8b5d.png)
base85解码475532444B4E525549453244494E4A57475132544B514A54473432544F4E4A5547515A44474D4A5648415A54414E4257473434544B514A5647595A54514D5A5147553444474D5A5547453355434E5254475A42444B514A57494D3254534D5A5447555A444D4E5256494532444F4E4A57475A41544952425547343254454E534447595A544D524A5447415A55493D3D3D
![](https://img.haomeiwen.com/i21107801/faaa2b23e252c7de.png)
十六进制转字符,base32解密,十六进制转字符,base64解密,MRCTF{Y0u_Are_4_p3rFect_dec0der}
0x05 Hello_Misc
得到两个文件
![](https://img.haomeiwen.com/i21107801/b69705f2f6a90418.png)
用stegsolve复原,得到一张png,信息是:!@#$%67*()-+
![](https://img.haomeiwen.com/i21107801/525a878b0ec6476b.png)
binwalk一下,发现zip,提出来,输入前面的信息,解压得到out.txt
这里尝试四个数转为二进制,最高位分别是01,11,00,10
![](https://img.haomeiwen.com/i21107801/729c5df55613b69e.png)
将它们取出来,再每8位一组,二进制转ascii,输出:rar-passwd:0ac1fe6b77be5dbe
![](https://img.haomeiwen.com/i21107801/3d3f983dd7fb44a5.png)
解压得到zip,再解压看文件,猜测zip是docx文件,改后缀名,全选文字,发现有猫腻
![](https://img.haomeiwen.com/i21107801/6919a734425c2f62.png)
颜色改为深色,再每一行base64解码,再把1去掉,MRCTF{He1Lo_mi5c~}
![](https://img.haomeiwen.com/i21107801/ab4065b444da8628.png)
0x06 你能看懂音符吗
修复文件头,解压得到文档
![](https://img.haomeiwen.com/i21107801/c5ae95d750b041a5.png)
显示隐藏文字,但是不能复制音乐符号,佛了呀。。。
![](https://img.haomeiwen.com/i21107801/f06636cebc26096c.png)
然后发现文档是zip格式,改后缀名,解压,在document.xml文件里找到了字符
音乐符号转文本,MRCTF{thEse_n0tes_ArE_am@zing~}
![](https://img.haomeiwen.com/i21107801/f39346877d01367d.png)
0x07 Unravel!!
一张png里提出2张png和一个zip,解压后还是png,根据文件名猜测aes加密
![](https://img.haomeiwen.com/i21107801/c71c17d36a62d55e.png)
压缩包加了密,wav末尾发现key=U2FsdGVkX1/nSQN+hoHL8OwV9iJB/mSdKk5dmusulz4=,解密
![](https://img.haomeiwen.com/i21107801/67f97ce7bdb6dae2.png)
解压,wav拖入silenteye,MRCTF{Th1s_is_the_3nd1n9}
![](https://img.haomeiwen.com/i21107801/07dd7dcd87b94a79.png)
0x08 千层套路
写脚本解压,压缩包名就是密码
![](https://img.haomeiwen.com/i21107801/7f56bfea82771e08.png)
漫长的等待,最后得到qr.txt,显然是像素点
![](https://img.haomeiwen.com/i21107801/88db7d6be9f6d4de.png)
用PIL库写脚本,得到二维码,扫描,MRCTF{ta01uyout1nreet1n0usandtimes}
![](https://img.haomeiwen.com/i21107801/0bb1de01cd7f33ce.png)
0x09 不眠之夜
一堆jpg,10x12=120张,先用montage命令将他们拼成一张
![](https://img.haomeiwen.com/i21107801/00167413f8066cc8.png)
![](https://img.haomeiwen.com/i21107801/4b3972d6b3b8d9c0.png)
再用gaps还原图片,MRCTF{Why_4re_U_5o_ShuL1an??}
![](https://img.haomeiwen.com/i21107801/f6a44cd0df58b21d.png)
![](https://img.haomeiwen.com/i21107801/afe66344649dbe62.png)
0x1A A Signal From ISS
手机中打开Robot36(iss无线电转图片工具),播放音频,捂上耳朵
https://apktrending.com/apk-android/xdsopl-robot36.html
![](https://img.haomeiwen.com/i21107801/12c1602801132a39.png)
merak{r3ce1ved_4n_img}
CRYPTO
0x01 天干地支+甲子
![](https://img.haomeiwen.com/i21107801/8ad15724167409cf.png)
0x02 keyboard
![](https://img.haomeiwen.com/i21107801/2b1bdba7cfce3b3d.png)
0x03 古典密码知多少
![](https://img.haomeiwen.com/i21107801/e1b776e67cfa310e.png)
![](https://img.haomeiwen.com/i21107801/a664801c82c3c88c.png)
对应古典密码表,得到FGCPFLIRTUASYON,再栅栏解密,MRCTF{CRYPTOFUN}
![](https://img.haomeiwen.com/i21107801/5f8d54f438e835cb.png)
0x04 vigenere
维吉尼亚密码,MRCTF{vigenere_crypto_crack_man}
https://www.guballa.de/vigenere-solver
![](https://img.haomeiwen.com/i21107801/65a5903f259b7535.png)
WEB
0x01 ez_bypass
![](https://img.haomeiwen.com/i21107801/8cfa9ec691a02301.png)
php是弱语言,要满足md5($id) === md5($gg) && $id !== $gg显然不可能,用数组可以绕过,?id[]=1&gg[]=2,
因为比较时,NULL===NULL
要满足passwd==1234567且passwd不是数字或字符数,可以用?passwd=1234567x绕过,
因为1234567x不是数字但比较时会省略x,满足1234567==1234567
![](https://img.haomeiwen.com/i21107801/d5634db4a7c656a3.png)