MISC刷题4

starme / 2024-10-20 / 原文

[CISCN 2018]Picture

下载得到附件--Picture.jpg

image-20240609221956095

先用010查看:

image-20240609223406868

image-20240609223427775

照理来说jpeg图片开头是FF D8,末尾是FF D9

但是这里结尾是C1 92,说明图片不止一个文件

binwalk:

image-20240609222407788

binwalk -e分离:

binwalk -e Picture.jpg --run=root

image-20240609223154392

文件97E4:

image-20240609223638064

结尾是=,可能是base64编码

解码:

image-20240609223741195

以KP开头,联想到zip压缩包开头是KP,这里可能调换了顺序

image-20240609224523168

从这里也可以看出。一般ZIP文件的16进制开头为50 4b,但这里是4b 50

积累一下文件头和文件尾的16进制

放到010中修复:

https://blog.csdn.net/fjh1997/article/details/100781601

image-20240609225546883

image-20240609225506855

错误信息就是密码

查看报错信息:ZeroDivision

image-20240609225933254

image-20240609225945078

integer division or modulo by zero即为密码

code文件内容:

以后打开misc文件用010就好了,还能看有没有隐藏文件什么的

image-20240609230122261

随波逐流一般梭:

image-20240609230216528

[SWPUCTF 2021 新生赛]我的银行卡密码

https://www.bilibili.com/read/cv19572358/

https://blog.csdn.net/m0_65938147/article/details/134265029

image-20240609230917910

得到附件.zip

打开时有密码,提示是6位数字

image-20240609231039737

密码为768521

解压后得到附件:

image-20240609231429428

93 53 63 71 51 63 41 51 83 63 23 23 93 62 61 94 93 71 41 92 41 71 63 41 51 31 83 43 41 21 81 22 21 74 42

不难看出每组的第一个数范围1-9,第二个数范围1-3,猜测是九宫格密码

image-20240609231944152

直接给脚本:

c = '93 53 63 71 51 63 41 51 83 63 23 23 93 62 61 94 93 71 41 92 41 71 63 41 51 31 83 43 41 21 81 22 21 74 42'
table = ['ABC','DEF','GHI','JKL','MNO','PQRS','TUV','WXYZ']
c = c.split(' ')
for i in range(len(c)):
    print(table[int(c[i][0])-2][int(c[i][1])-1],end='')

运行得到:YLOPJOGJVOCCYNMZYPGXGPOGJDVIGATBASH

题目信息:

The encryption scheme of next stage is decided by the last  letters.

意思:

image-20240609232321671

letters为复数,意思应为最后几个字母

上面得到的最后几个字母为:

GATBASH

即埃特巴什解密 YLOPJOGJVOCCYNMZYPGXGPOGJDVIG (注意将用于提示的ATBASH删去再进行解密)

image-20240609233613947

得到:

BOLKQLTQELXXBMNABKTCTKLTQWERT

这里结尾是QWERT,即键盘解密

去掉qwert,解密bolkqltqelxxbmnabktctklt

#qwe密码解密,输入字符串,返回解密的明文
def encrypt_qwe(s):
    DIC_QWE = "qwertyuiopasdfghjklzxcvbnm"
    DIC_ABC = "abcdefghijklmnopqrstuvwxyz"
    result=""
    for i in s:
        for j in range(len(DIC_ABC)):
            if i==DIC_QWE[j]:
                result=result+DIC_ABC[j]
    return result

s="bolkqltqelxxbmnabktctklt"
s=s.lower()#统一转化为小写
s=s.strip().replace(" ","")#去掉空格

print(encrypt_qwe(s))

运行得到:xisraseacsuuxzykxreverse

最后字母为reverse,即逆向倒置

a="xisraseacsuuxzykx"
print(a[::-1])

运行得到:xkyzxuuscaesarsix

caesarsix即凯撒移动6位:xkyzxuus

image-20240609234352171

然后再倒置一次后得:moortser

即NSSCTF{moortser}

[GDOUCTF 2023]misc_or_crypto?

附件--flag.bmp

通过在Linux终端中输入:

string flag.bmp

使用010打开:

image-20240702213415861

发现RSA

这时候需要提取出来,可以采取直接复制粘贴或strings、PuzzleSolver:

image-20240702214030993

image-20240702214058298

RSA 私钥:
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
Zz3sqGk8HMVp4kz56zWu4kq+lvl3VGur1BBvmFVE7SUyCzFHFsW7ZS1EDC7wGY7K4UxBq+TZsMg9si50mCsoQz3dWivNGXxrDoFcaTlF4DW7//ZAA1BKQNnsuvDLjP8KzCvNjolTSBWqlUH5iT2ywe7whmKOky/ais9SCyvxr6Q=

image-20240702213854442

flag{babym1sc_p1us_zygotecrypt0}

[MoeCTF 2022]nyanyanya

得到附件--qwq.png

image-20240611002517131

将其拖入010:

image-20240611002449465

提示是LSB隐写

使用zsteg:

zsteg qwq.png

image-20240611002648351

也可以用StegSolve:

image-20240702215549626

[FSCTF 2023]萧河

附件--png,无后缀

File-Format:

image-20240611003113600

通过文件名和文件尾与png有关,推测应该修改文件头

image-20240611003247431

得到:

image-20240611003304861

一看就是差半截,修复宽高:

image-20240611003400735

修复后:

image-20240611003421811

即FSCTF{xiaojia_xiaohe}