zhouxu180 发表于 2023-3-16 18:39:09

青少年CTFmisc-光头强小分队2

https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030388-1637807068.png
按顺序解题
根据提示反转逆序
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030422-1060517266.png
使用脚本
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030537-884468126.png
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030561-1612115486.png
补全文件头然后拉高得到key
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030558-1287699118.png
打开2
根据提示猜测工具
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030409-1836315266.png
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030377-417220523.png
使用steghide解出文件
文件里是pdu加密
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030465-1197011335.png
解密得到信息 百度搜索得到
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024203032737-946169650.png


打开博客主页得到ke
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024203058058-550996674.png


https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030511-1072168393.png
JJEncode解码: qsnctfCTF666
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030557-1989499347.png
解开3压缩包
利用前面提示steg??? 猜出
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030424-1770317810.png
使用之前的key解出 最后一个压缩包的密码 16zhuanhuan
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030394-333098674.png
这里利用一个刚学到的知识点
16进制位移
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030397-970042395.png
https://img2022.cnblogs.com/blog/2658992/202210/2658992-20221024202030420-469133642.png
使用密码得到flag

页: [1]
查看完整版本: 青少年CTFmisc-光头强小分队2