友情链接

Web师傅:skyxmao师傅

内心OS

第一次参加这种大型比赛,实力较菜,请师傅们多多指点

Misc | 完成 | 第一

下载文件,看一下doc没有任何问题,

没有发现任何隐写,然后修改文件后缀名docx为zip,解压

将所有解压后的文件打开,用notepad++ 在此全部文件中搜索flag字段,即可找到flag

Misc | 完成 | BBQ

庞大的base64,使用Notepad++

相信大家一眼就能看到是base64文件隐写流(可能不准确)

这里推荐一手脚本

def get_base64_diff_value(s1, s2):
base64chars = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/'
res = 0
for i in xrange(len(s2)):
if s1[i] != s2[i]:
return abs(base64chars.index(s1[i]) - base64chars.index(s2[i]))
return res def solve_stego():
with open('BBQ.txt', 'rb') as f:
file_lines = f.readlines()
bin_str = ''
for line in file_lines:
steg_line = line.replace('\n', '')
norm_line = line.replace('\n', '').decode('base64').encode('base64').replace('\n', '')
diff = get_base64_diff_value(steg_line, norm_line)
print diff
pads_num = steg_line.count('=')
if diff:
bin_str += bin(diff)[2:].zfill(pads_num * 2)
else:
bin_str += '0' * pads_num * 2
print goflag(bin_str) def goflag(bin_str):
res_str = ''
for i in xrange(0, len(bin_str), 8):
res_str += chr(int(bin_str[i:i + 8], 2))
return res_str if __name__ == '__main__':
solve_stego()

  

Misc | 完成 | 看图说话

使用了N多JPG隐写,最后使用到了这个软件SilentEye

由于是弱密码,一跑就出来了

以下都是弱口令
"", "", "", "", "", "", "password", "", "", "", "", "", "", "", "woaini", "", "", "", "hotmail.com", "", "", "", "", "a123456", "", "163.com", "", "yahoo.com.cn", "sohu.com", "yahoo.cn", "111222tianya", "163.COM", "tom.com", "139.com", "wangyut2", "pp.com", "yahoo.com", "", "", "", "", "", "zxcvbnm", "123456a", "", "", "", "", "", "", "", "a321654", "", "", "", "", "q123456", "", "aaaaaa", "a123456789", "qq123456", "", "woaini1314", "a123123", "a111111", "", "a5201314", "z123456", "liuchang", "a000000", "", "asd123", "", "", "", "", "woaini520", "", "123456789a", "woaini123", "q1q1q1q1", "a12345678", "qwe123", "123456q", "", "asdasd", "", "", "", "", "", "iloveyou", "", "", "", "", "", "", "", "woaini521", "", "18n28n24a5", "abc123", "password", "123qwe", "", "", "", "dearbook", "", "", "", "", "", "", "", "aaaaaaaa", "", "", "a123456789", "", "1qaz2wsx", "xiazhili", "", "password", "", "qqqqqqqq", "", "qwertyuiop", "qq123456", "iloveyou", "", "", "", "asdfghjkl", "1q2w3e4r", "123456abc", "", "", "", "qazwsxedc", "abcd1234", "", "", "asdasdasd", "", "", "", "abc123456", "a12345678", "", "a1234567", "1234qwer", "qwertyui", "123456789a", "qq.com", "", "163.com", "ohwe1zvq", "xiekai1121", "", "", "", "", "", "", "", "", "as1230", "zz123456", "", "", "", "", "", "", "", "", "", "", "", "", "caonima99", "", "", "qq776491", "hahabaobao", "", "", "leqing123", "", "", "", "", "", "", "", "", "", "", "", "", "", "woaini", "", "", "RAND#a#8", "hotmail.com", "", "", "", "", "", "a123456"

Misc | 未完成 | 等等我

由于比赛结束,看不了题目。题目就发不了了。

不过我经过脚本跑出了这些不知道有没有用

12,235,05,0125,01234,035,0145,01234,3,25,05,4,023,25,25,015,013,05,4,015,23,05,023,0123,023,4,015,15,012,0123,125,123,025,023,4,0123,125,125,125,13

不好意思了,这里我也卡住了

Misc | 未完成 | 抓我把

下载数据流,在数据流,在4 和 5 中看到了一堆的数字,一看就知道504B 是zip,把他复制出来放入txt中

同样使用插件

获得zip,打开下载是一个加密的word,然后使用软件跑一下得到密码

123321(又是一个弱密码)


然后我就呆住,请各位大师师傅赐教,我真不会惹。(PS:师傅们吃草莓嘛?)

最新文章

  1. 451. Sort Characters By Frequency
  2. Torch 7 load saved model failed, 加载保存的模型失败
  3. 看苹果官方API
  4. 新浪微博客户端(49)-删除输入的Emotion表情
  5. WCF使用net.tcp寄宿到IIS中(转)
  6. errno 错误码
  7. OpenFlow Switch学习笔记(六)——Instructions和Actions
  8. TCP/IP详解学习笔记(4)-- ARP 和 RARP
  9. Java 之 StringTokenizer
  10. (转)iOS Wow体验 - 第二章 - iOS用户体验解析(2)
  11. VLSI和ASIC的区别(转)
  12. NYOJ-914 Youth的最大化(贪心)
  13. 死磕 java集合之TreeMap源码分析(二)- 内含红黑树分析全过程
  14. pycharm连接mysql数据库插入中文数据时出现1366编码错误
  15. Spring 使用介绍(十)—— 单元测试
  16. jquery $.ajax $.get $.post的区别?
  17. 修改电脑自动休眠时间win10
  18. Netty源码分析第4章(pipeline)---->第3节: handler的删除
  19. JS地毯式学习二
  20. 通过Jenkins进行提权的一个思路

热门文章

  1. jQuery实现拖拽元素
  2. Centos 7 k8s Deployment新副本控制器
  3. Markdown 主题修改
  4. Android学习笔记主题(Theme)资源文件
  5. Anroid组件滚动视图(ScollView)简单使用
  6. 设计模式系列之外观模式(Facade Pattern)——提供统一的入口
  7. 使用TimerTask创建定时任务
  8. 基于flink和drools的实时日志处理
  9. pikachu靶场-XSS
  10. dart快速入门教程 (4)