Pragyan CTF 2019

Cookie Monster

Do prepare to see cookies lurking everywhere. http://159.89.166.12:13500/

打开网址查看cookie,果然有flag

md5发现flag一个是pc 一个是tf正符合我们的flag格式。打开Preserve log,不断刷新页面收包,将所有cookies中的flag收集md5之后连接起来就是完整的flag


Game of Faces

The Game of Faces, welcomes you. In this era, where AIs generate a lot of faces, we would like you to contribute to the same by uploading your image. Thank you for contributing, to continue.

http://159.89.166.12:15000/

划重点:upload your image

打开网址检查发现图片中隐藏着一个表单,type = “file”,name = “profile_pic”, method = "GET"

尝试上传 http://159.89.166.12:15000/?profile_pic 拿到了一串看起来像base64过的东西VGhlX3Njcm9sbF9zYXlzPXRoZV9uaWdodF9raW5nVlN2YWx5cmlhbi50eHQ==

在线base64解密 拿到 The_scroll_says=the_night_kingVSvalyrian.txt


Welcome

Do you think this is a normal image? No! Dig deeper to find out more.....

划重点:big deeper

下载拿到一张welcome的图片 尝试binwalk一下图片

提取出来可以看到里面一个2968.zip和一个d.zip,打开

a.zip打开里面是一个a.png 需要密码打开 猜测在secret.bmp拿到密码打开a.png拿flag

secret.bmp打不开,用string看一下

最后的b=xxxxxx==看起来像base64 复制下来在线解密一下

果然拿到密码,打开a.png

猜测图片里面隐写了flag 用stegsolver打开 在其中红通道隐写了flag


Spoiler

Bran Stark, wants to convey an important information to the Sansa back at winterfell. He sends her a message. The message however, is encrypted though.

Can you find out what Bran is trying to convey??

打开key.pdf

strings看一下文件

在最后出现了像十六进制的东西 copy出来删掉所有0

6a6f6e736e6f776973647261676f6e62796269727468

这个十六进制跟pdf中的等长,尝试异或

504354467b4a4f4e5f49535f54415247415259454e7d

十六进制转ASCII 拿到flag

更多WRITEUP:https://blog.52szu.tech/ctf_writeup/pctf2019/welcome/

你可能感兴趣的:(Pragyan CTF 2019)