MoeCTF 2022 MISC 复现

[MoeCTF 2022]Misc指北

pdf底部摩斯解开既是flag

[MoeCTF 2022]zip套娃

四位数字爆破->掩码->伪加密

[MoeCTF 2022]nyanyanya

zsteg直接出 010末尾也有提示是lsb

[MoeCTF 2022]cccrrc

题目名字提示的很清除了,zip crc爆破

提供一个好用的工具

https://www.ddosi.org/crc32-tools/

[MoeCTF 2022]rabbit

010拖到文件底部发现密文,题目明显rabbit加密,无密钥直接解

[MoeCTF 2022]what_do_you_recognize_me_by

修复PNG文件头,改后缀为PNG扫码得flag

[MoeCTF 2022]usb

最简单的usb键盘流量,直接放knm里跑出来

再用键盘流量脚本翻译

normalKeys = {"04":"a", "05":"b", "06":"c", "07":"d", "08":"e", "09":"f", "0a":"g", "0b":"h", "0c":"i", "0d":"j", "0e":"k", "0f":"l", "10":"m", "11":"n", "12":"o", "13":"p", "14":"q", "15":"r", "16":"s", "17":"t", "18":"u", "19":"v", "1a":"w", "1b":"x", "1c":"y", "1d":"z","1e":"1", "1f":"2", "20":"3", "21":"4", "22":"5", "23":"6","24":"7","25":"8","26":"9","27":"0","28":"<RET>","29":"<ESC>","2a":"<DEL>", "2b":"\t","2c":"<SPACE>","2d":"-","2e":"=","2f":"[","30":"]","31":"\\","32":"<NON>","33":";","34":"'","35":"<GA>","36":",","37":".","38":"/","39":"<CAP>","3a":"<F1>","3b":"<F2>", "3c":"<F3>","3d":"<F4>","3e":"<F5>","3f":"<F6>","40":"<F7>","41":"<F8>","42":"<F9>","43":"<F10>","44":"<F11>","45":"<F12>"}

shiftKeys = {"04":"A", "05":"B", "06":"C", "07":"D", "08":"E", "09":"F", "0a":"G", "0b":"H", "0c":"I", "0d":"J", "0e":"K", "0f":"L", "10":"M", "11":"N", "12":"O", "13":"P", "14":"Q", "15":"R", "16":"S", "17":"T", "18":"U", "19":"V", "1a":"W", "1b":"X", "1c":"Y", "1d":"Z","1e":"!", "1f":"@", "20":"#", "21":"$", "22":"%", "23":"^","24":"&","25":"*","26":"(","27":")","28":"<RET>","29":"<ESC>","2a":"<DEL>", "2b":"\t","2c":"<SPACE>","2d":"_","2e":"+","2f":"{","30":"}","31":"|","32":"<NON>","33":"\"","34":":","35":"<GA>","36":"<","37":">","38":"?","39":"<CAP>","3a":"<F1>","3b":"<F2>", "3c":"<F3>","3d":"<F4>","3e":"<F5>","3f":"<F6>","40":"<F7>","41":"<F8>","42":"<F9>","43":"<F10>","44":"<F11>","45":"<F12>"}


nums = []
keys = open(r"D:\桌面\out.txt")
for line in keys:
    if len(line)!=17: #首先过滤掉鼠标等其他设备的USB流量
         continue
    nums.append(line[0:2]+line[4:6]) #取一、三字节
keys.close()
output = ""
for n in nums:
    if n[2:4] == "00" :
        continue

    if n[2:4] in normalKeys:
        if n[0:2]=="02": #表示按下了shift
            output += shiftKeys [n[2:4]]
        else :
            output += normalKeys [n[2:4]]
    else:
        output += ''
print('output :' + output)

结果按照<del> 和<cap>删除、修改即可

[MoeCTF 2022]Locked_bass

题目描述:

你想玩贝斯?这锁虚挂着的,能踹

一时间不知道是伪加密还是爆破,结合附件unlocked感觉是伪加密

010打开观察果然是

修改第二个09 00 为 00 00 后取消伪加密,打开压缩包

base64解密获得flag

[MoeCTF 2022]小纸条

看着像猪圈密码,对照的时候别看那条弧线

[MoeCTF 2022]Python

这题更是纯送

[MoeCTF 2022]CCCC

还在送

[MoeCTF 2022]run_me

有完没完

[MoeCTF 2022]A_band

下载得到一大堆二进制文本

先转16进制

可以用010 选择粘贴自二进制

再复制,选择粘贴自十六进制

看起来有一些颜文字,但不完全

新建一个普通文件,改编辑方式为UTF-8得到AAencode密文

解密后base32->base58->base64得到flag

[MoeCTF 2022]bell202

第一次见文件名modem实际上是在提示

使用kali自带的minimodem这个工具

bell202对应参数1200

minimodem --rx -f moe_modem.wav 1200

[MoeCTF 2022]想听点啥

音频隐写不考音频

解压得到带密码的压缩包 MP3文件和 .mscz文件

对mp3分析一通发现没用,转而搜索mscz文件

下载相关软件打开乐谱发现 密码 MOECTFI1iKE

打开压缩包得到乱码的txt和一个py脚本

py脚本内容是对flag异或加密,重新异或回去得到flag

[MoeCTF 2022]run_me2

kali一跑就出

[MoeCTF 2022]寻找黑客的家

汉明供养生坊秒了

moectf{shenzhen_longhua_qingquan}

[MoeCTF 2022]hamming

汉明码

from functools import reduce
import numpy as np
err = reduce(lambda x,y : x^y , [i for i ,bit in enumerate(bitblock) if bit])

  • 3
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值