每日刷题记录1

Preface

There were some wrong in my previous way of learning.

It’s difficult to consolidate knowledge only by learning knowledge without practice.

So I decide to solve some ctf-subject to consolidate my konwledge.

Why I using English to write this project?

It’s easily to find the reason.

MISC

Title : something_in_image

Source : XCTF

File : click here


The file-name is “badimage”,so drop it into 010editor.

Obvious, so much zero ,and only a little informations are normal.

每日刷题记录1_第1张图片

每日刷题记录1_第2张图片

Look up “flag”:

It’s easy ,but i want to know hows it work in the real way;

每日刷题记录1_第3张图片

Look carefully you can find the RAR’s file-header.

Rename the suffix(后缀名) to RAR ,get these files:

每日刷题记录1_第4张图片

TODO :

每日刷题记录1_第5张图片

Nothing get ,but i solve it .

RE

Title : Hello, CTF

Source : XCTF

File : click me

Hint : 菜鸡发现Flag似乎并不一定是明文比较的

每日刷题记录1_第6张图片

Drop in IDA:

每日刷题记录1_第7张图片

Combined with hint , is compare with the encryoted text .

In addtion, the string is HEX ,decrypt result is “CrackMeJustForFun

It’s very much like flag.

flag get!!

CRYPTO

Title : flag_in_your_hand

source : XCTF

File : click me

It’s a website :

每日刷题记录1_第8张图片

Open the js file with vs ,find this string:

每日刷题记录1_第9张图片

Intuition tells me this is Base64 encrypto , because it’s the same as encrypted tables.

the first part is encrypto by ASCII tables.

每日刷题记录1_第10张图片

When the number == 3 , the ascii is right ,so the right num is:

[115,101,99,117,114,105,116,121,45,120,98,117]

每日刷题记录1_第11张图片

Enter it to the website:

每日刷题记录1_第12张图片

falg get!!!

你可能感兴趣的:(每日刷题,unctf,安全)