1.1 题目名称pika
flag: flag{d6246d1f41fad032ee30193f3af15408}
解题思路说明: 打开是一个图片,试用着stegosovle来观看图片的类容与内容,发现隐写通道000,得到一段base64的编码,进行去解码,得到一串pikalang-language,进行解密就好。
解题过程:stegosovle000通道
Base64解码
得到结果:pi pi pi pi pi pi pi pi pi pi pika pipi pi pipi pi pi pi pipi pi pi pi pi pi pi pi pipi pi pi pi pi pi pi pi pi pi pi pichu pichu pichu pichu ka chu pipi pipi pipi pipi pi pi pikachu pi pi pi pi pi pi pikachu ka ka ka ka ka ka ka ka ka ka ka pikachu pi pi pi pi pi pi pikachu pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pikachu ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu pichu ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu ka ka ka ka pikachu pi pi pikachu pi pi pikachu pipi pikachu pichu ka ka ka ka ka pikachu pipi pi pi pikachu pichu pi pi pi pikachu ka ka ka pikachu pipi pikachu ka ka ka ka ka pikachu pi pi pi pikachu pichu ka pikachu pi pi pi pikachu ka pikachu pipi pi pikachu pikachu pichu pi pikachu ka ka ka pikachu pi pikachu pi pi pi pi pi pi pi pi pikachu ka ka ka ka ka ka pikachu pipi pi pikachu pichu pikachu pipi ka ka ka ka ka pikachu pi pi pi pi pi pikachu pichu ka ka pikachu pi pi pi pi pikachu ka pikachu ka ka ka ka pikachu pi pi pi pi pi pi pi pi pikachu pipi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pikachu
翻译地址:https://www.dcode.fr/pikalang-language
得到flag{d6246d1f41fad032ee30193f3af15408}
1.2 题目名称welcometociscn
flag: flag{61ee5435b6f59d42329ac2644d887dc2}
解题思路说明: 打开图片,直接看得到flag了
解题过程:
1.3 题目名称:old
flag:flag{ a9462922e5da8ef93d213c33168881c5}
解题思路说明: 打开发现一段编码,试用Rot13进行解码,发现是栅栏W型编码,进行栅栏解码,根据题目提示注意MD5,又进行了MD5编码解密。
解题过程:打开得到加密的,进行Rot13解密重新上传取消得到的进行栅栏解密根据题目提示MD5,进行解密
flagish1p0yev3ryda7!
32位小写MD5
a9462922e5da8ef93d213c33168881c5
flag{ a9462922e5da8ef93d213c33168881c5 }
1.4 题目名称:snowberg
flag: flag{69b74fce-451b-46f2-b3dd-be2a9761a1c1}
解题思路说明:打开发现是一张图片,用010editor,发现里面夹杂有压缩包,用Kali binwalk进行分离,用foremost分解图片,然后提取压缩包,发现加密,并用CRC32进行爆破,Tweakpng打开图片,发现所有IDAT段的crc校验码不对,没一个IDAT段的CRC校验码都不对,将所有CRC校验码提取出来,进行AES解密。
解题过程:先用010打开发现图片的问题重新上传取消用Kali binwalk foremost进行图片的分离 zsteg分析lsb隐写提取压缩包
CRC32进行爆破重新上传取消 key:
63f0c7380cc3a35
Tweakpng打开图片,发现所有IDAT段的crc校验码不对重新上传取消没一个IDAT段的CRC校验码都不对,将所有CRC校验码提取出来 553246736447566b5831395954315362314930456f5857557a5a6c5730306d796d75474570766436693875504b4979514a757130704e4f715a793254756c4b630a6c6d4f6135754b4f6767366e2f6b6e577079426e52673d3d
16进制转字符串重新上传取消AES解密 flag{69b74fce-451b-46f2-b3dd-be2a9761a1c1}
1.5 题目名称:easycry
flag: flag{061cc4091400c082234a57034ed05cf2}
解题思路说明:elf64位文件,IDA反编译,动态调试,发现是aes加密,取main函数的密文和密钥解密即可重新上传取消
密钥和密文,直接解密,先reverse一下
enc = ["485DACBAED1D5932",
"5B34FA438CBD1ECE",
"315917F925BB6E9D",
"5B72B55BB93620DE"]
key = ["0706050403020100",
"0F0E0D0C0B0A0908",
"1716151413121110",
"1F1E1D1C1B1A1918"]
for i in enc:
for j in range(len(i), -2, -2):
print(i[j:j + 2], end="")
print()
for i in key:
for j in range(len(i), -2, -2):
print(i[j:j + 2], end="")
重新上传取消
flag{061cc4091400c082234a57034ed05cf2}