2020安洵杯--MISC

签到题
打开链接给了一个道格的微信公众号二维码,关注微信公众号回复:fl4g
得到一个链接:https://share.weiyun.com/bKjXMcZJ 密码:d0g3
链接里是一个flag.docx文件,里面是:🐻🐧👞🐪👲👎👜👣👚🐧👤👖🐸👅👛👖🐿🐨👋👖👣👠🐾👟👫🐨👰👴
用这个网站http://www.atoolbox.net/Tool.php?Id=936
解码一下就可以得到flag:D0g3{Welc0m_ANd_H1T_liGht1y}

王牌特工
文件链接:链接:https://pan.baidu.com/s/1Ahlkgsm1SYJe3V_8RomZ2g 提取码:lhh1
将得到的文件拖进虚拟机里查看一下:

(base) pwn@ubuntu:~/Desktop/test$ file findme 
findme: Linux rev 1.0 ext3 filesystem data, UUID=f2b1e8fa-29a6-454b-b6df-6182044790bc (needs journal recovery) (large files)
(base) pwn@ubuntu:~/Desktop/test$ 

可以发现是一个ext3文件,我们先挂载看下文件内的内容:

(base) pwn@ubuntu:~$ su
Password: 
root@ubuntu:/home/pwn# ls
123     code       Downloads         miniconda3  Pictures   Videos
ae64    Desktop    examples.desktop  Music       Public
alpha3  Documents  git               peda        Templates
root@ubuntu:/home/pwn# cd Downloads/
root@ubuntu:/home/pwn/Downloads# file findme
findme: cannot open `findme' (No such file or directory)
root@ubuntu:/home/pwn/Downloads# file '/home/pwn/Desktop/findme' 
/home/pwn/Desktop/findme: Linux rev 1.0 ext3 filesystem data, UUID=f2b1e8fa-29a6-454b-b6df-6182044790bc (needs journal recovery) (large files)
root@ubuntu:/home/pwn/Downloads# mkdir /mnt/abc
root@ubuntu:/home/pwn/Downloads# mount '/home/pwn/Desktop/findme' /mnt/abc
(base) pwn@ubuntu:/mnt/abc$ ls -l
total 1042
-rw-r--r-- 1 root root 1048576 Nov 21 02:49 flagbox
-rw-r--r-- 1 root root      29 Nov 21 02:49 key.txt
drwx------ 2 root root   12288 Nov 21 03:09 lost+found

挂载文件夹⾥可⻅lost+found文件夹,flagbox和key.txt. 根据key提⽰,flagbox应⽤Veracrypt打开:

key:a_cool_key
use Veracrypt

⾥⾯flag.txt显⽰这⾥是假flag,让我应该看看之前的路。想到lost+found文件夹,于是尝试从ext3硬盘镜像中恢复被删除文件。

(base) pwn@ubuntu:~/Desktop$ ext3grep ./findme --ls --inode 2
Running ext3grep version 0.10.2
WARNING: I don't know what EXT3_FEATURE_COMPAT_EXT_ATTR is.
WARNING: EXT3_FEATURE_INCOMPAT_RECOVER is set. This either means that your partition is still mounted, and/or the file system is in an unclean state.
Number of groups: 2
Loading group metadata... done
Minimum / maximum journal block: 218 / 1247
Loading journal descriptors... sorting... done
The oldest inode block that is still in the journal, appears to be from 1605957136 = Sat Nov 21 03:12:16 2020
Number of descriptors in journal: 29; min / max sequence numbers: 3 / 10
Inode is Allocated
Finding all blocks that might be directories.
D: block containing directory start, d: block containing more directory entries.
Each plus represents a directory start that references the same inode as a directory start that we found previously.

Searching group 0: DD+++
Searching group 1: 
Writing analysis so far to 'findme.ext3grep.stage1'. Delete that file if you want to do this stage again.
Result of stage one:
  2 inodes are referenced by one or more directory blocks, 2 of those inodes are still allocated.
  1 inodes are referenced by more than one directory block, 1 of those inodes is still allocated.
  0 blocks contain an extended directory.
Result of stage two:
  2 of those inodes could be resolved because they are still allocated.
All directory inodes are accounted for!


Writing analysis so far to 'findme.ext3grep.stage2'. Delete that file if you want to do this stage again.
The first block of the directory is 204.
Inode 2 is directory "".
Directory block 204:
          .-- File type in dir_entry (r=regular file, d=directory, l=symlink)
          |          .-- D: Deleted ; R: Reallocated
Indx Next |  Inode   | Deletion time                        Mode        File name
==========+==========+----------------data-from-inode------+-----------+=========
   0    1 d       2                                         drwxr-xr-x  .
   1    2 d       2                                         drwxr-xr-x  ..
   2    3 d      11                                         drwx------  lost+found
   3    4 r      12                                         rrw-r--r--  flagbox
   4  end r      13                                         rrw-r--r--  key.txt
   5  end r      14  D 1605957180 Sat Nov 21 03:13:00 2020  rrw-------  .coolboy.swp
   6  end r      15  D 1605957136 Sat Nov 21 03:12:16 2020  rrw-------  .coolboy.swpx

用十六进制编辑器打开修复好的.coolboy.swp文件,拉到尾部发现:

55yf55qE5a+G56CBOnRoaXNfaXNfYV90cnVlX2tleQ==
(base) pwn@ubuntu:~$ echo 55yf55qE5a+G56CBOnRoaXNfaXNfYV90cnVlX2tleQ== | base64 -d
真的密码:this_is_a_true_key(base) pwn@ubuntu:~$ 

用这个真的密码再对上一次的flagbox解密:

flag{you_are_a_cool_boy}

套娃
文件链接:链接:https://pan.baidu.com/s/1V8wrrDeLeQfiYeCW91DFSg 提取码:vqvt
打开文件发现全是带锁的文件,用ZipCenOp伪加密走了一遭发现并没有结果,用WinRAR查看password文件夹发现里面的文件字节数都一样是2符合CRC32碰撞的思路,脚本走一下:

import binascii
import string

dic = string.printable
crc1 = 0xea4446b6
crc2 = 0xed7987de
crc3 = 0x46fe0943
crc4 = 0x4be30989
crc5 = 0xb31975c0
crc6 = 0xd6bb1bef

for i in dic:
    for j in dic:
        s = i + j
        if (crc1 == (binascii.crc32(s) & 0xffffffff)):
            text1 = s
        if (crc2 == (binascii.crc32(s) & 0xffffffff)):
            text2 = s
        if (crc3 == (binascii.crc32(s) & 0xffffffff)):
            text3 = s
        if (crc4 == (binascii.crc32(s) & 0xffffffff)):
            text4 = s
        if (crc5 == (binascii.crc32(s) & 0xffffffff)):
            text5 = s
        if (crc6 == (binascii.crc32(s) & 0xffffffff)):
            text6 = s
print text1 + text2 + text3 + text4 + text5 + text6

得到结果:!qQIdEa@#!z)
对easyzip解密,得到的文件先用WinRAR修复一下,发现其中的redeme.txt文件和它的副本文件CRC值一样,分别将它们两个单独压缩,用明文攻击:
在这里插入图片描述
得到密码:%3#c$v!@
用base64解码:

Wm1kcFkxOWZibTkwYkh0d2NuZGpYMTk5WVhvbVkyVmhaR2xB

继续base64解码:

ZmdpY19fbm90bHtwcndjX199YXomY2VhZGlA

继续base64解码:

fgic__notl{prwc__}az&ceadi@

很明显一个栅栏密码:

flag{zip&crc_we_can_do_it}

BeCare4
文件链接:链接:https://pan.baidu.com/s/1gbIb7dvcDNp5ENuUqmdagQ 提取码:ehuh
文件里一张带锁图片和一个文本,压缩包内的照片带锁用伪加密试了试没有结果,那密码应该是在文本内了,文本的话可能存在款字节隐写,网站解一下:
oh,you found the pass:RealV1siBle
拿到图片,根据题目的提示Eye,利用SilentEye解密一下,直接得到flag:D0g3{1nV1sible_flag_Can_You_find?!}

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值