当前位置: 首页 > web >正文

UCSC CTF 2025|MISC

1、USB

flag{ebdfea9b-3469-41c7-9070-d7833ecc6102}

2、three

part1是图片隐水印

part1:8f02d3e7

part2是2进制变换

-ce89-4d6b-830e-

Part3先从pass.pcapng得到密码字典

解压缩密码:thinkbell

3个部分合并得到flag{8f02d3e7-ce89-4d6b-830e-5d0cb5695077}

3、小套不是套

题目附加解压缩得到1个二维码png和2个压缩文件

识别二维码,得到PassW0rd is !@#QWE123987

套.zip里一堆4个字节的小文件,CRC爆破

全部爆破结果合并就是Base64,解码得到Key is SecretIsY0u

R1JWVENaUllJVkNXMjZDQ0pKV1VNWTNIT1YzVTROVEdLVjJGTVYyWU5NNFdRTTNWR0ZCVVdNS1hNSkZXQ00zRklaNUVRUVRCR0pVVlVUS0VQQktHMlozWQ==

用!@#QWE123987解压缩密码解压tess.zip,得到mushroom.zip,伪加密,7z直接解压缩得到mushroom.jpg

010 Editor加载,JPG尾部还有1个去掉特征PNG图片

PNG图片尾部还有隐写

莫名其妙的故弄玄虚,无需分离文件,直接OurSecret,密码SecretIsY0u

flag{6f6bf445-8c9e-11ef-a06b-a4b1c1c5a2d2}

4、No.shArk

解压缩流量文件,导出HTTP和FTP流量文件

FTP中导出next.jpg和SNOW.DOC,亮相到SNOW隐写,HTTP中导出3个PNG文件,查看了CRC值,其实是同1个PNG文件,还有1个w1.html

另外DNS存在大量01数据,直接导出请求信息并处理

11111111111111001100000000001100110000000000000000110000000000110011000011111111000000000000000000001100000000001100110000111111110000000000000000000011001111110011001111000011000011110000000000000000110011111100110011110000110000111100000000000000001100111111001100111111001100000011000000000000000011001111110011001111110011000000110000000000000000110011111100110000111100110011001100000000000000001100111111001100001111001100110011000000000000000011000000000011001111110000000000110000000000000000110000000000110011111100000000001100000000000000001111111111111100110011001100110011000000000000000011111111111111001100110011001100110000000000000000000000000000000000001111001100111100000000000000000000000000000000000011110011001111000000000000000011110000111111000000110011110000000000110011111111111100001111110000001100111100000000001100111111110000111111110000110000000011111111001100111100111100001111111100001100000000111111110011001111001111111100110000110011111100000000110011111111001100001111001100001100111111000000001100111111110011000000001100001100000011000011001111110000111100111100000011000011000000110000110011111100001111001111001100110011111100000000110011110000111100111100001111001100111111000000001100111100001111001111000011110000000011001111111100110000111111000011111111001100000000110011111111001100001111110000111111110000000000000011000011001111111111110000000000001100000000000000110000110011111111111100000000000011000000000000000000111111110011001111110011000011000000000000000000001111111100110011111100110000110000111111110011110011000000111100001111111111000000001111111100111100110000001111000011111111110000000000000000000000001100000000111100110000001111001111000000000000000011000000001111001100000011110011110000000000000000000011000000001111001100111100000000000000000000000000110000000011110011001111000000000000000000000011000000110011001100000011001111110000000000000000110000001100110011000000110011111100000000000000001111111100111100111111111100110011000000000000000011111111001111001111111111001100110000000000000000001111001100001100111111000011111100000000000000000011110011000011001111110000111111000000000000000000110011111111111111001100001111000000000000000000001100111111111111110011000011110000000000000000001111111100110011001111000011111100000000000000000011111111001100110011110000111111000000000000000000110000001111001100001111001111111100000000000000001100000011110011000011110011111111

01生成图片,发现是二维码,补齐定位块

扫码识别出:Y0U_Fi8d_ItHa@aaHH,分析PNG文件,发现是Arnold变换,可以直接爆破,

同时在PNG尾部发现提示:keyis:keykeyishere

silenteye处理JPG隐写,密码:keykeyishere

得到了Arnold变换的参数shuffle=5,a=7,b=3

得到flag的第一部分:flag{46962f4d-8d29-,然后用密码:Y0U_Fi8d_ItHa@aaHH处理HTML的SNOW隐写

flag{46962f4d-8d29-11ef-b3b6-a4b1c1c5a2d2}

http://www.xdnf.cn/news/617.html

相关文章:

  • (学习总结34)Linux 库制作与原理
  • Python Web开发常用框架介绍
  • SSM--AOP 日志
  • maven的安装与配置、IDEA集成maven
  • Redis 事件循环(Event Loop)
  • 主机运行状态的监控命令(top命令)
  • python——字典
  • Opencv图像处理:模板匹配对象
  • Python小游戏:俄罗斯方块简易版三
  • skywalking agent 关联docker镜像
  • 关于AI:记忆、身份和锁死
  • 【MySQL】MySQL的基础语法及其语句的介绍
  • Qt6离线安装过程
  • 在win上安装Ubuntu安装Anaconda(linx环境)
  • React 自定义Hook之usePrevious
  • CFS 的调度类型:普通调度 vs 组调度
  • 【中级软件设计师】语言处理程序(汇编程序、解释程序、编译程序)附软考真题
  • go语言优雅关机和优雅重启笔记
  • WEMOS LOLIN32
  • 第一部分笔试Day_01到Day24_每天两道OJ
  • 图解MCP:Model Context Protocol
  • 从零开始用Pytorch实现LLaMA 4的混合专家(MoE)模型
  • 【Java】接口interface学习
  • 国际数据加密算法(IDEA)详解
  • CentOS 10 /root 目录重新挂载到新分区槽
  • 【数据结构入门训练DAY-18】信息学奥赛一本通T1331-后缀表达式的值
  • URLDNS链构造
  • Android Studio 中 Drawable 详细全解
  • Android Drawable 目录下的 XML 图形文件详解
  • 在 Linux 上部署 .NET Core 应用并配置为开机自动启动