当前位置: 首页 > news >正文

UCSC CTF 2025|MISC

1、USB

flag{ebdfea9b-3469-41c7-9070-d7833ecc6102}

2、three

part1是图片隐水印

part1:8f02d3e7

part2是2进制变换

-ce89-4d6b-830e-

Part3先从pass.pcapng得到密码字典

解压缩密码:thinkbell

3个部分合并得到flag{8f02d3e7-ce89-4d6b-830e-5d0cb5695077}

3、小套不是套

题目附加解压缩得到1个二维码png和2个压缩文件

识别二维码,得到PassW0rd is !@#QWE123987

套.zip里一堆4个字节的小文件,CRC爆破

全部爆破结果合并就是Base64,解码得到Key is SecretIsY0u

R1JWVENaUllJVkNXMjZDQ0pKV1VNWTNIT1YzVTROVEdLVjJGTVYyWU5NNFdRTTNWR0ZCVVdNS1hNSkZXQ00zRklaNUVRUVRCR0pVVlVUS0VQQktHMlozWQ==

用!@#QWE123987解压缩密码解压tess.zip,得到mushroom.zip,伪加密,7z直接解压缩得到mushroom.jpg

010 Editor加载,JPG尾部还有1个去掉特征PNG图片

PNG图片尾部还有隐写

莫名其妙的故弄玄虚,无需分离文件,直接OurSecret,密码SecretIsY0u

flag{6f6bf445-8c9e-11ef-a06b-a4b1c1c5a2d2}

4、No.shArk

解压缩流量文件,导出HTTP和FTP流量文件

FTP中导出next.jpg和SNOW.DOC,亮相到SNOW隐写,HTTP中导出3个PNG文件,查看了CRC值,其实是同1个PNG文件,还有1个w1.html

另外DNS存在大量01数据,直接导出请求信息并处理

11111111111111001100000000001100110000000000000000110000000000110011000011111111000000000000000000001100000000001100110000111111110000000000000000000011001111110011001111000011000011110000000000000000110011111100110011110000110000111100000000000000001100111111001100111111001100000011000000000000000011001111110011001111110011000000110000000000000000110011111100110000111100110011001100000000000000001100111111001100001111001100110011000000000000000011000000000011001111110000000000110000000000000000110000000000110011111100000000001100000000000000001111111111111100110011001100110011000000000000000011111111111111001100110011001100110000000000000000000000000000000000001111001100111100000000000000000000000000000000000011110011001111000000000000000011110000111111000000110011110000000000110011111111111100001111110000001100111100000000001100111111110000111111110000110000000011111111001100111100111100001111111100001100000000111111110011001111001111111100110000110011111100000000110011111111001100001111001100001100111111000000001100111111110011000000001100001100000011000011001111110000111100111100000011000011000000110000110011111100001111001111001100110011111100000000110011110000111100111100001111001100111111000000001100111100001111001111000011110000000011001111111100110000111111000011111111001100000000110011111111001100001111110000111111110000000000000011000011001111111111110000000000001100000000000000110000110011111111111100000000000011000000000000000000111111110011001111110011000011000000000000000000001111111100110011111100110000110000111111110011110011000000111100001111111111000000001111111100111100110000001111000011111111110000000000000000000000001100000000111100110000001111001111000000000000000011000000001111001100000011110011110000000000000000000011000000001111001100111100000000000000000000000000110000000011110011001111000000000000000000000011000000110011001100000011001111110000000000000000110000001100110011000000110011111100000000000000001111111100111100111111111100110011000000000000000011111111001111001111111111001100110000000000000000001111001100001100111111000011111100000000000000000011110011000011001111110000111111000000000000000000110011111111111111001100001111000000000000000000001100111111111111110011000011110000000000000000001111111100110011001111000011111100000000000000000011111111001100110011110000111111000000000000000000110000001111001100001111001111111100000000000000001100000011110011000011110011111111

01生成图片,发现是二维码,补齐定位块

扫码识别出:Y0U_Fi8d_ItHa@aaHH,分析PNG文件,发现是Arnold变换,可以直接爆破,

同时在PNG尾部发现提示:keyis:keykeyishere

silenteye处理JPG隐写,密码:keykeyishere

得到了Arnold变换的参数shuffle=5,a=7,b=3

得到flag的第一部分:flag{46962f4d-8d29-,然后用密码:Y0U_Fi8d_ItHa@aaHH处理HTML的SNOW隐写

flag{46962f4d-8d29-11ef-b3b6-a4b1c1c5a2d2}

相关文章:

  • 计算机视觉与深度学习 | Transformer原理,公式,代码,应用
  • 【文献阅读】EndoNet A Deep Architecture for Recognition Tasks on Laparoscopic Videos
  • 表征学习(Representation Learning)
  • 【实战中提升自己】内网安全部署之dot1x部署 本地与集成AD域的主流方式(附带MAC认证)
  • A2A协议详解:打造统一的AI代理通信标准,实现多Agent系统协同
  • transformer注意力机制
  • 机器学习(神经网络基础篇)——个人理解篇6(概念+代码)
  • windows拷贝文件脚本
  • 梯度求解 第31次CCF-CSP计算机软件能力认证
  • 大模型应用案例:主动提问式的 AI 面试官(接入 DeepSeek)
  • 普罗米修斯Prometheus监控安装(mac)
  • 模拟实现strcmp,strcpy,strlen,strcat,strstr
  • Dijkstra 算法入门笔记 (适用于算法竞赛初学者) - C++ 代码版
  • 【上位机——MFC】消息映射机制
  • AI日报 - 2025年04月21日
  • SQL之DML(查询语句:select、where)
  • 数据通信学习笔记之OSPF的区域
  • AIGC赋能插画创作:技术解析与代码实战详解
  • 自由的控件开发平台:飞帆中使用 css 和 js 库
  • LeetCode283.移动零
  • 消息人士称哈马斯愿与以色列达成长期停火
  • 海港主场不敌蓉城遭遇联赛首败,好消息是武磊终于复出了
  • 深一度|上海半马,展示“体育+”无限可能的路跑狂欢
  • 瑞士成第15届北影节主宾国,6部佳作闪耀“瑞士电影周”
  • 北京理工大学解除宫某聘用关系,该教授此前被指骚扰猥亵学生
  • 淄博张店区国资公司挂牌转让所持“假国企”股权,转让底价为1元