<kbd id="afajh"><form id="afajh"></form></kbd>
<strong id="afajh"><dl id="afajh"></dl></strong>
    <del id="afajh"><form id="afajh"></form></del>
        1. <th id="afajh"><progress id="afajh"></progress></th>
          <b id="afajh"><abbr id="afajh"></abbr></b>
          <th id="afajh"><progress id="afajh"></progress></th>

          “東華杯”2021年大學(xué)生網(wǎng)絡(luò)安全邀請賽 暨第七屆上海市大學(xué)生網(wǎng)絡(luò)...

          共 2662字,需瀏覽 6分鐘

           ·

          2021-11-08 01:28

          checkin

          012a612d19d78e46c068812a53e12fd9.webp

          +AGYAbABhAGcAewBkAGgAYgBfADcAdABoAH0-

          UTF-7編碼

          • UTF-7在線解碼站:http://toolswebtop.com/text/process/decode/utf-7

          flag{dhb_7th}
          project

          85427b3f25141e2611fbedcde3eba07c.webp
          454d09205d4ce4282b1ac06b5c556814.webp
          test.exe附加了很多別的數(shù)據(jù),運行之后發(fā)現(xiàn)生成了一個problem_bak.zip
          解壓problem_bak.zip得到一個郵件文件
          932a8b3214cfeb2e93e7105a17a16a84.webp
          復(fù)制出來Python簡單處理或者直接使用在線站:https://the-x.cn/zh-cn/base64/

          from base64 import *

          with open('jpg_base64.txt', 'r') as f:
          lines = f.readlines()
          base64_data = ''
          with open('flag.jpg', 'wb') as f1:
          for line in lines:
          base64_data += line.strip()
          f1.write(b64decode(base64_data))

          2c871a0dc96e232d6d8f65c6107e3efb.webp
          得到一張丑不拉幾的圖片,嘗試了很多jpg隱寫,最后發(fā)現(xiàn)是OurSecret隱寫
          a1dae8470076214610c964a87f530fc4.webp
          但是沒有密碼,繼續(xù)分析;在郵件里還有一些數(shù)據(jù),一段Base64、一段Quoted-Printable編碼
          7488ca5fec2b0ab68c3a909bf047d2cf.webp
          0940040a3d40a43cbe17dd9e7f64d42b.webp
          沒有密碼線索,都是文本,試一下零寬度字符隱寫

          • https://330k.github.io/misc_tools/unicode_steganography.html

          75d6d27d4351080363e2f88ba40fda51.webp
          7bf896fed50aa822d2f79893641b1961.webp
          兩段話都隱寫了密碼
          bccc49d055d59d2c4b154905cc754c51.webp

          flag{f3a5dc36-ad43-d4fa-e75f-ef79e2e28ef3}
          JumpJumpTiger

          b0c0b4dffedb4d75dbddfc363dd1542c.webp
          77e00420b9a17fb64493565f88e65703.webp
          丟進ida64分析,main函數(shù)是個提示
          e2db8957617302cb4872af6ed02d1205.webp
          大概就是個這么的意思,根據(jù)奇偶位分?jǐn)?shù)據(jù)
          7add4a141864f0cffbdfab7a2e2eec76.webp
          在程序中還發(fā)現(xiàn)了大量字符串
          43f9476abd3e29a26c60439adbd20422.webp
          iVB...開頭的很明顯是PNG圖片的base64數(shù)據(jù)開頭,/9j/...開頭的很明顯是JPG的base64數(shù)據(jù)開頭;從0開始奇數(shù)位是PNG數(shù)據(jù),偶數(shù)位是JPG數(shù)據(jù)

          另外除了這部分base64數(shù)據(jù)之外,還發(fā)現(xiàn)了夾雜著0的base64數(shù)據(jù)
          01f16ae35365c4d112cc54afac84822a.webp
          先把base64數(shù)據(jù)提取出來,數(shù)據(jù)太長了,不便復(fù)制,使用腳本來提取比較方便,Python簡單處理即可

          from base64 import *

          start_opt = 0x2600
          middle_opt = 0x10DF00
          end_opt = 0x7D4660
          png_data = ''
          jpg_data = ''

          with open('jump.exe', 'rb') as f:
          f.seek(start_opt)
          part1_base64 = f.read(middle_opt - start_opt).decode()
          for i in range(len(part1_base64)):
          if i % 2 == 0:
          jpg_data += part1_base64[i]
          else:
          png_data += part1_base64[i]

          with open('flag.jpg', 'wb') as f1:
          f1.write(b64decode(jpg_data))

          with open('flag.png', 'wb') as f2:
          f2.write(b64decode(png_data))

          得到兩張圖,但是png的圖片數(shù)據(jù)并不完整;猜測另一部分的png圖片的base64數(shù)據(jù)即為之前參雜0的數(shù)據(jù)
          e13ce345efbb0ea61701146897893137.webp
          繼續(xù)使用Python簡單處理

          from base64 import *

          start_opt = 0x2600
          middle_opt = 0x10DF00
          end_opt = 0x7D4660
          png_data = ''

          with open('jump.exe', 'rb') as f:
          f.seek(start_opt)
          part1_base64 = f.read(middle_opt - start_opt).decode()
          for i in range(len(part1_base64)):
          if i % 2 == 0:
          pass
          else:
          png_data += part1_base64[i]
          f.seek(middle_opt)
          part2_base64 = f.read(end_opt - middle_opt).decode()
          for i1 in range(len(part2_base64)):
          if i1 % 2 == 0:
          pass
          else:
          png_data += part2_base64[i1]

          with open('flag.png', 'wb') as f2:
          f2.write(b64decode(png_data))

          eb42a100848215bcb523acfa2cc6563b.webp
          盲水印
          d829d634e570972566a35529fb33adef.webp
          817ec353b3bcd723de53bf8a46389b8b.webp
          看不清的話用stegsolve調(diào)整一下

          flag{72f73bbe-9193-e59a-c593-1b1cb8f76714}
          where_can_find_code

          8ae05ebdbe7d7ee055d52d2f128649b5.webp
          f4ad043a15592232e6264d9c28b55995.webp

          format("Translate the letter J into I");
          dpeb{e58ca5e2-2c51-4eef-5f5e-33539364deoa}

          d3c369e1a96855e0843844550ac68152.webp
          wbstego隱寫,無密碼
          ff955e52c34953954b5626609cc959f0.webp
          得到云影密碼

          20810842042108421

          Python簡單處理轉(zhuǎn)換即可

          code = '20810842042108421'
          code_list = code.split('0')
          alphabet = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
          text = ''
          for nums in code_list:
          plus_num = 0
          for n in nums:
          plus_num += int(n)
          text += alphabet[plus_num - 1]
          print('[+]: {}'.format(text))
          PS C:\Users\Administrator\Downloads> python code.py
          [+]: BINGO

          接下來就是利用一條這條語句

          Translate the letter J into I

          c41e28a213c040a9fe2364af874ba774.webp
          c061b1b04f847df301a324dfe27ce265.webp

          • http://rumkin.com/tools/cipher/playfair.php

          a662c3a24c25dc7a18e480701f3cfa65.webp

          flag{d58af5d2-2a51-4dde-5e5d-33539364cdbf}


          瀏覽 71
          點贊
          評論
          收藏
          分享

          手機掃一掃分享

          分享
          舉報
          評論
          圖片
          表情
          推薦
          點贊
          評論
          收藏
          分享

          手機掃一掃分享

          分享
          舉報
          <kbd id="afajh"><form id="afajh"></form></kbd>
          <strong id="afajh"><dl id="afajh"></dl></strong>
            <del id="afajh"><form id="afajh"></form></del>
                1. <th id="afajh"><progress id="afajh"></progress></th>
                  <b id="afajh"><abbr id="afajh"></abbr></b>
                  <th id="afajh"><progress id="afajh"></progress></th>
                  人人草人人草 | 男女男精品网站 | 亚洲视频在线观看高清 | 色秘 乱码一区二区三区唱戏 | 国产av最新福利 国产jk在线观看 |