UCSC CTF 2025|MISC

1、USB

flag{ebdfea9b-3469-41c7-9070-d7833ecc6102}

2、three

part1是图片隐水印

part1:8f02d3e7

part2是2进制变换

-ce89-4d6b-830e-

Part3先从pass.pcapng得到密码字典

解压缩密码:thinkbell

3个部分合并得到flag{8f02d3e7-ce89-4d6b-830e-5d0cb5695077}

3、小套不是套

题目附加解压缩得到1个二维码png和2个压缩文件

识别二维码,得到PassW0rd is !@#QWE123987

套.zip里一堆4个字节的小文件,CRC爆破

全部爆破结果合并就是Base64,解码得到Key is SecretIsY0u

R1JWVENaUllJVkNXMjZDQ0pKV1VNWTNIT1YzVTROVEdLVjJGTVYyWU5NNFdRTTNWR0ZCVVdNS1hNSkZXQ00zRklaNUVRUVRCR0pVVlVUS0VQQktHMlozWQ==

用!@#QWE123987解压缩密码解压tess.zip,得到mushroom.zip,伪加密,7z直接解压缩得到mushroom.jpg

010 Editor加载,JPG尾部还有1个去掉特征PNG图片

PNG图片尾部还有隐写

莫名其妙的故弄玄虚,无需分离文件,直接OurSecret,密码SecretIsY0u

flag{6f6bf445-8c9e-11ef-a06b-a4b1c1c5a2d2}

4、No.shArk

解压缩流量文件,导出HTTP和FTP流量文件

FTP中导出next.jpg和SNOW.DOC,亮相到SNOW隐写,HTTP中导出3个PNG文件,查看了CRC值,其实是同1个PNG文件,还有1个w1.html

另外DNS存在大量01数据,直接导出请求信息并处理

11111111111111001100000000001100110000000000000000110000000000110011000011111111000000000000000000001100000000001100110000111111110000000000000000000011001111110011001111000011000011110000000000000000110011111100110011110000110000111100000000000000001100111111001100111111001100000011000000000000000011001111110011001111110011000000110000000000000000110011111100110000111100110011001100000000000000001100111111001100001111001100110011000000000000000011000000000011001111110000000000110000000000000000110000000000110011111100000000001100000000000000001111111111111100110011001100110011000000000000000011111111111111001100110011001100110000000000000000000000000000000000001111001100111100000000000000000000000000000000000011110011001111000000000000000011110000111111000000110011110000000000110011111111111100001111110000001100111100000000001100111111110000111111110000110000000011111111001100111100111100001111111100001100000000111111110011001111001111111100110000110011111100000000110011111111001100001111001100001100111111000000001100111111110011000000001100001100000011000011001111110000111100111100000011000011000000110000110011111100001111001111001100110011111100000000110011110000111100111100001111001100111111000000001100111100001111001111000011110000000011001111111100110000111111000011111111001100000000110011111111001100001111110000111111110000000000000011000011001111111111110000000000001100000000000000110000110011111111111100000000000011000000000000000000111111110011001111110011000011000000000000000000001111111100110011111100110000110000111111110011110011000000111100001111111111000000001111111100111100110000001111000011111111110000000000000000000000001100000000111100110000001111001111000000000000000011000000001111001100000011110011110000000000000000000011000000001111001100111100000000000000000000000000110000000011110011001111000000000000000000000011000000110011001100000011001111110000000000000000110000001100110011000000110011111100000000000000001111111100111100111111111100110011000000000000000011111111001111001111111111001100110000000000000000001111001100001100111111000011111100000000000000000011110011000011001111110000111111000000000000000000110011111111111111001100001111000000000000000000001100111111111111110011000011110000000000000000001111111100110011001111000011111100000000000000000011111111001100110011110000111111000000000000000000110000001111001100001111001111111100000000000000001100000011110011000011110011111111

01生成图片,发现是二维码,补齐定位块

扫码识别出:Y0U_Fi8d_ItHa@aaHH,分析PNG文件,发现是Arnold变换,可以直接爆破,

同时在PNG尾部发现提示:keyis:keykeyishere

silenteye处理JPG隐写,密码:keykeyishere

得到了Arnold变换的参数shuffle=5,a=7,b=3

得到flag的第一部分:flag{46962f4d-8d29-,然后用密码:Y0U_Fi8d_ItHa@aaHH处理HTML的SNOW隐写

flag{46962f4d-8d29-11ef-b3b6-a4b1c1c5a2d2}

评论 3
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值