UCSC CTF 2025|MISC
1、USB
flag{ebdfea9b-3469-41c7-9070-d7833ecc6102}
2、three
part1是图片隐水印
part1:8f02d3e7
part2是2进制变换
-ce89-4d6b-830e-
Part3先从pass.pcapng得到密码字典
解压缩密码:thinkbell
3个部分合并得到flag{8f02d3e7-ce89-4d6b-830e-5d0cb5695077}
3、小套不是套
题目附加解压缩得到1个二维码png和2个压缩文件
识别二维码,得到PassW0rd is !@#QWE123987
套.zip里一堆4个字节的小文件,CRC爆破
全部爆破结果合并就是Base64,解码得到Key is SecretIsY0u
R1JWVENaUllJVkNXMjZDQ0pKV1VNWTNIT1YzVTROVEdLVjJGTVYyWU5NNFdRTTNWR0ZCVVdNS1hNSkZXQ00zRklaNUVRUVRCR0pVVlVUS0VQQktHMlozWQ==
用!@#QWE123987解压缩密码解压tess.zip,得到mushroom.zip,伪加密,7z直接解压缩得到mushroom.jpg
010 Editor加载,JPG尾部还有1个去掉特征PNG图片
PNG图片尾部还有隐写
莫名其妙的故弄玄虚,无需分离文件,直接OurSecret,密码SecretIsY0u
flag{6f6bf445-8c9e-11ef-a06b-a4b1c1c5a2d2}
4、No.shArk
解压缩流量文件,导出HTTP和FTP流量文件
FTP中导出next.jpg和SNOW.DOC,亮相到SNOW隐写,HTTP中导出3个PNG文件,查看了CRC值,其实是同1个PNG文件,还有1个w1.html
另外DNS存在大量01数据,直接导出请求信息并处理
11111111111111001100000000001100110000000000000000110000000000110011000011111111000000000000000000001100000000001100110000111111110000000000000000000011001111110011001111000011000011110000000000000000110011111100110011110000110000111100000000000000001100111111001100111111001100000011000000000000000011001111110011001111110011000000110000000000000000110011111100110000111100110011001100000000000000001100111111001100001111001100110011000000000000000011000000000011001111110000000000110000000000000000110000000000110011111100000000001100000000000000001111111111111100110011001100110011000000000000000011111111111111001100110011001100110000000000000000000000000000000000001111001100111100000000000000000000000000000000000011110011001111000000000000000011110000111111000000110011110000000000110011111111111100001111110000001100111100000000001100111111110000111111110000110000000011111111001100111100111100001111111100001100000000111111110011001111001111111100110000110011111100000000110011111111001100001111001100001100111111000000001100111111110011000000001100001100000011000011001111110000111100111100000011000011000000110000110011111100001111001111001100110011111100000000110011110000111100111100001111001100111111000000001100111100001111001111000011110000000011001111111100110000111111000011111111001100000000110011111111001100001111110000111111110000000000000011000011001111111111110000000000001100000000000000110000110011111111111100000000000011000000000000000000111111110011001111110011000011000000000000000000001111111100110011111100110000110000111111110011110011000000111100001111111111000000001111111100111100110000001111000011111111110000000000000000000000001100000000111100110000001111001111000000000000000011000000001111001100000011110011110000000000000000000011000000001111001100111100000000000000000000000000110000000011110011001111000000000000000000000011000000110011001100000011001111110000000000000000110000001100110011000000110011111100000000000000001111111100111100111111111100110011000000000000000011111111001111001111111111001100110000000000000000001111001100001100111111000011111100000000000000000011110011000011001111110000111111000000000000000000110011111111111111001100001111000000000000000000001100111111111111110011000011110000000000000000001111111100110011001111000011111100000000000000000011111111001100110011110000111111000000000000000000110000001111001100001111001111111100000000000000001100000011110011000011110011111111
01生成图片,发现是二维码,补齐定位块
扫码识别出:Y0U_Fi8d_ItHa@aaHH,分析PNG文件,发现是Arnold变换,可以直接爆破,
同时在PNG尾部发现提示:keyis:keykeyishere
silenteye处理JPG隐写,密码:keykeyishere
得到了Arnold变换的参数shuffle=5,a=7,b=3
得到flag的第一部分:flag{46962f4d-8d29-,然后用密码:Y0U_Fi8d_ItHa@aaHH处理HTML的SNOW隐写
flag{46962f4d-8d29-11ef-b3b6-a4b1c1c5a2d2}