menu Ga1@xy's Wor1d
蓝帽杯决赛misc部分wp
1295 浏览 | 2020-12-21 | 阅读时间: 约 1 分钟 | 分类: wp,MISC | 标签: Misc,比赛wp
请注意,本文编写于 302 天前,最后修改于 295 天前,其中某些信息可能已经过时。

签到题

arr = [102, 108, 97, 103, 123, 119, 101, 49, 99, 48, 109, 101, 95, 98, 108, 117, 101, 99, 97, 116, 125]
flag = ""
for i in range(0, len(arr)):
            flag += chr(arr[i])

print flag

#flag{we1c0me_bluecat}

MISC隐写

png后藏zip,打开得到nopassword的pdf,wbstego解密得到

+3aLNKf5PVGVaIe914pCfNQq9iBVHyGQmweGOvu32lQRIFWtuTZE4pXrhq0IbZyB8jHbROK4evy4bebPhhy+1w==

key is update

根据最开始的图片信息 ,想到serpent加密,在线网站解密得到hint

hint:107380/107381/107382 0 obj  and  00 length

根据hint找到pdf中对应三个位置的00字符串长度,分别为1919/7753/34,拼起来转成字符串,得到压缩包密码rmrf,解压得到

bhwf{ICqK_Cq_q0_CLrspSqRclf_Ma!}

key:wjkdsbfjks

解关键字加密,对应大小写,得到flag

FLAG{MISC_IS_S0_INTERESTING_OH!}
 
flag{MIsC_Is_s0_INterEsTing_Oh!}

赛后问了出题人,实际上是需要密钥的凯撒:keyed caesar

QAQ_pcap

导出http流,可以发现三个图片,分别是where is flag,在where.jpg后可以发现一些额外的信息

CLIENT_HANDSHAKE_TRAFFIC_SECRET 2425afae8403d4cd9aa8a4d948cc5050a3a20662f2462c71f44f557bfac4467e b22b5ba2f48131708a56a2df1b2cdd120d61bb3dc256d708226151ffe6032630
SERVER_HANDSHAKE_TRAFFIC_SECRET 2425afae8403d4cd9aa8a4d948cc5050a3a20662f2462c71f44f557bfac4467e 5eff566b827ddeaf226d3d0a1a9b744300a0f7cbf02591edf22bd9ae3f2ff2ea
CLIENT_HANDSHAKE_TRAFFIC_SECRET 0a9ef339b13fcf541370679dc7db820c146e3df48dbb1839cd87e8be39f2fabe 6543367fd5952d9921b8311ab29e096ed7ded83614b57d42f1292fe9bb3d3047
SERVER_HANDSHAKE_TRAFFIC_SECRET 0a9ef339b13fcf541370679dc7db820c146e3df48dbb1839cd87e8be39f2fabe d1c18bf45f803a7447a1258cc2f60b941ffbb9585d56ad308611081fadeaf5e8
CLIENT_HANDSHAKE_TRAFFIC_SECRET 4c735f2fef62530d32f002756b2779b614acabe6d4cce454229a626d05caf981 66124dea26edf0c23c13196c0ba404e8e1cfefa2d8b07a8db7275672ed80718b
SERVER_HANDSHAKE_TRAFFIC_SECRET 4c735f2fef62530d32f002756b2779b614acabe6d4cce454229a626d05caf981 06416d9ccec6c02df4bebff28c31719bd4040edf403092492dfe8ed89040fb06
......

查一下这些数据的开头,就能知道是TLS加密相关的log,将这些数据另存为log文件,导入数据包即可解密原来数据包中的tls流量,再次导出http流,发现so_easy.rar,解压得到另一个流量包

修改文件头为D4C3B2A1,打开流量包,发现是usb流量,tshark提取

tshark -r so_easy.pcap -T fields -e usb.capdata | sed '/^\s*$/d' > usbdata.txt

提取出来的东西用脚本转化不了,改变思路,继续看流量包,发现下面有HCI_USB的流量,根据他的received对照键盘流量对照表,手撕一下,最后八个字节代表数据

02 00 00 00 00 00 00 00 按住shift
02 00 0b 00 00 00 00 00 输入H
02 00 00 00 00 00 00 00 松开shift
00 00 00 00 00 00 00 00 输入之间的分隔
00 00 0c 00 00 00 00 00 输入i
00 00 00 00 00 00 00 00 分隔
02 00 00 00 00 00 00 00 按住shift
02 00 1e 00 00 00 00 00 输入!
02 00 00 00 00 00 00 00 松开shift
00 00 00 00 00 00 00 00 分隔
至此得到 Hi!
02 00 00 00 00 00 00 00 按住shift
02 00 17 00 00 00 00 00 输入T
02 00 00 00 00 00 00 00 松开shift
00 00 00 00 00 00 00 00 分隔
00 00 0b 00 00 00 00 00 输入h
00 00 00 00 00 00 00 00 分隔
00 00 0c 00 00 00 00 00 输入i
00 00 00 00 00 00 00 00 分隔
00 00 16 00 00 00 00 00 输入s
00 00 00 00 00 00 00 00 分隔
至此得到 Hi!This
00 00 2c 00 00 00 00 00 输入空格

以此类推,最终可以得到

Hi!This is y flag!
The flag{} is flag{Pc@p_1s_5o_3asY!}
Bye!

全部评论

info 评论功能已经关闭了呐!