BMZCTF 解不开的秘密

下载后是一个压缩包,里有一个file文件,和一个flag.docx文本
BMZCTF 解不开的秘密_第1张图片
用文本工具打开file文件,里面有许多数字和少许的英文。怀疑是十六进制
放入010editor中
BMZCTF 解不开的秘密_第2张图片
看到最后有个"=",怀疑是base64。用base64解码:

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\RealVNC]

[HKEY_CURRENT_USER\Software\RealVNC\vnclicensewiz]
"_AnlClientId"="8f5cc378-2e1d-4670-80e0-d2d81d882561"
"_AnlSelected"="0"
"_AnlInclRate"="0.0025"

[HKEY_CURRENT_USER\Software\RealVNC\vncserver]

[HKEY_CURRENT_USER\Software\RealVNC\VNCViewer4]
"dummy"=""

[HKEY_CURRENT_USER\Software\RealVNC\VNCViewer4\MRU]
"00"="127.0.0.1"
"Order"=hex:00,01
"01"="127.0.0.1:5900"

[HKEY_CURRENT_USER\Software\RealVNC\WinVNC4]
"Password"=hex:37,5e,be,86,70,b3,c6,f3
"SecurityTypes"="VncAuth"
"ReverseSecurityTypes"="None"
"QueryConnect"=dword:00000000
"PortNumber"=dword:0000170c
"LocalHost"=dword:00000000
"IdleTimeout"=dword:00000e10
"HTTPPortNumber"=dword:000016a8
"Hosts"="+,"
"AcceptKeyEvents"=dword:00000001
"AcceptPointerEvents"=dword:00000001
"AcceptCutText"=dword:00000001
"SendCutText"=dword:00000001
"DisableLocalInputs"=dword:00000000
"DisconnectClients"=dword:00000001
"AlwaysShared"=dword:00000000
"NeverShared"=dword:00000000
"DisconnectAction"="None"
"RemoveWallpaper"=dword:00000000
"RemovePattern"=dword:00000000
"DisableEffects"=dword:00000000
"UseHooks"=dword:00000001
"PollConsoleWindows"=dword:00000001
"CompareFB"=dword:00000001
"Protocol3.3"=dword:00000000
"dummy"=""

可以看到中间位置有`"Password"=hex:37,5e,be,86,70,b3,c6,f3`
开头`[HKEY_CURRENT_USER\Software\RealVNC\vncserver]`中有RealVNC。于是用`Vccx4.exe`进行破解:
BMZCTF 解不开的秘密_第3张图片
得到密码:!QAZ2wsx
用密码打开flag.docx,将图片移开,并全选修改字体颜色,可以看到flag
BMZCTF 解不开的秘密_第4张图片

你可能感兴趣的:(BMZCTF刷题记录,信息安全,安全)