bugku misc-花点流量听听歌

69 篇文章 0 订阅
本文探讨了一段音频文件中发现的Beaufort密码,通过USB数据解密及文本线索追踪,揭示了隐藏的密码key 'usb6',并展示了密码破解过程。最终解码出'happyeveryday',解开压缩包获取旗子信息。
摘要由CSDN通过智能技术生成

下载得到,花点流量听听歌.mp3文件
用audactity打开发现报错
在这里插入图片描述用audtion打开,看查看频谱图,发现这个位置有点奇怪
在这里插入图片描述放大得到beaufort-cipher,一种加密
在这里插入图片描述
百度一下得知这是一种类似于维吉尼亚密码的古典替换密码,这种密码是需要解密key的,所以我们继续往下看

拉入010发现用压缩包和一串字符串
在这里插入图片描述
foremost分离得到一个压缩包解压得到whereiskey,里面有
在这里插入图片描述flag.rar 要密码,txt是一串伤感的话,只能先从流量包入手
在这里插入图片描述
发现都是USB的流量,提取一下 ,也可以用写好的工具https://github.com/WangYihang/UsbKeyboardDataHacker
在这里插入图片描述
保存为1.txt,并写个python每隔两个加上一个冒号
在这里插入图片描述然后附上大佬的脚本得到

normalKeys = {"04":"a", "05":"b", "06":"c", "07":"d", "08":"e", "09":"f", "0a":"g", "0b":"h", "0c":"i", "0d":"j", "0e":"k", "0f":"l", "10":"m", "11":"n", "12":"o", "13":"p", "14":"q", "15":"r", "16":"s", "17":"t", "18":"u", "19":"v", "1a":"w", "1b":"x", "1c":"y", "1d":"z","1e":"1", "1f":"2", "20":"3", "21":"4", "22":"5", "23":"6","24":"7","25":"8","26":"9","27":"0","28":"<RET>","29":"<ESC>","2a":"<DEL>", "2b":"\t","2c":"<SPACE>","2d":"-","2e":"=","2f":"[","30":"]","31":"\\","32":"<NON>","33":";","34":"'","35":"<GA>","36":",","37":".","38":"/","39":"<CAP>","3a":"<F1>","3b":"<F2>", "3c":"<F3>","3d":"<F4>","3e":"<F5>","3f":"<F6>","40":"<F7>","41":"<F8>","42":"<F9>","43":"<F10>","44":"<F11>","45":"<F12>"}
shiftKeys = {"04":"A", "05":"B", "06":"C", "07":"D", "08":"E", "09":"F", "0a":"G", "0b":"H", "0c":"I", "0d":"J", "0e":"K", "0f":"L", "10":"M", "11":"N", "12":"O", "13":"P", "14":"Q", "15":"R", "16":"S", "17":"T", "18":"U", "19":"V", "1a":"W", "1b":"X", "1c":"Y", "1d":"Z","1e":"!", "1f":"@", "20":"#", "21":"$", "22":"%", "23":"^","24":"&","25":"*","26":"(","27":")","28":"<RET>","29":"<ESC>","2a":"<DEL>", "2b":"\t","2c":"<SPACE>","2d":"_","2e":"+","2f":"{","30":"}","31":"|","32":"<NON>","33":"\"","34":":","35":"<GA>","36":"<","37":">","38":"?","39":"<CAP>","3a":"<F1>","3b":"<F2>", "3c":"<F3>","3d":"<F4>","3e":"<F5>","3f":"<F6>","40":"<F7>","41":"<F8>","42":"<F9>","43":"<F10>","44":"<F11>","45":"<F12>"}
output = []
keys = open('out.txt')
for line in keys:
    try:
        if line[0]!='0' or (line[1]!='0' and line[1]!='2') or line[3]!='0' or line[4]!='0' or line[9]!='0' or line[10]!='0' or line[12]!='0' or line[13]!='0' or line[15]!='0' or line[16]!='0' or line[18]!='0' or line[19]!='0' or line[21]!='0' or line[22]!='0' or line[6:8]=="00":
             continue
        if line[6:8] in normalKeys.keys():
            output += [[normalKeys[line[6:8]]],[shiftKeys[line[6:8]]]][line[1]=='2']
        else:
            output += ['[unknown]']
    except:
        pass
keys.close()

flag=0
print("".join(output))
for i in range(len(output)):
    try:
        a=output.index('<DEL>')
        del output[a]
        del output[a-1]
    except:
        pass
for i in range(len(output)):
    try:
        if output[i]=="<CAP>":
            flag+=1
            output.pop(i)
            if flag==2:
                flag=0
        if flag!=0:
            output[i]=output[i].upper()
    except:
        pass
print ('output :' + "".join(output))

输出
在这里插入图片描述 thkepeasyswoirdsnotuhesreb?6
output :thepasswordnothere?

再根据和txt的内容
在这里插入图片描述

在这里插入图片描述
上面的是删除,(取每部分最后一个),一共删除的内容是keyisusb6
得到key =usb6,在拿010得到的字符串解码,但是解密发现usb6不对
在这里插入图片描述去掉6才行
在这里插入图片描述

得到passwdishappyeveryday
压缩包密码happyeveryday,然后得到flag

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值