BugkuCTF-MISC题Pokergame
補充:
用010hex打開zip文件。
把504B0304后的第3、4個byte改成0000
即將0900改為0000
而504B0102后的第5、6個byte不需改成0000即可破解偽加密。
解題
下載,解壓
文件有hint.txt,king.jpg,kinglet.jpg,Poke.zip
通過binwalk -e 和foremost分別分離king.jpg與kinglet.jpg
從king.jpg分離得到:
加密壓縮包,加密了code.txt
嘗試爆破無果后,嘗試偽加密,成功
解壓得到code.txt
很明顯得base64轉圖片,在線工具轉一下
https://tool.jisuapi.com/base642pic.html
得到另一半二維碼
再看kinglet.jpg,分離得到:
7z壓縮包,打開發現文件錯誤,010分析,尾部是png文件尾
分離出png文件,得到
或者foremost直接分離出此圖片
通過window系統的作圖工具合成
組合起來發現缺少定位符,手動補齊一下
掃碼得到 key{P0ke_Paper}
得到第一步Poke.zip加密壓縮包得解壓密碼
解壓Poke.zip
老K(K.jpg)明顯有問題,打不開。010分析下,頭部為504B0304
發現是zip文件
修改后綴,解壓發現是加密壓縮包
尋找解壓密碼
其他圖片暫沒看出什么異樣
分析David’s words.txt
先看David’s words.txt,注意到里面有一句:“Only A is 1”
再觀察一下密文的結構,所以把2345678910替換成0,把A替換成1,然后把替換得到的二進制轉為字符。
import base64 s="2345678910A2345678910A23456789102345678910AA2345678910A234567891023456789102345678910AAA2345678910A234567891023456789102345678910AA23456789102345678910AAA2345678910AAA2345678910AA234567891023456789102345678910AA2345678910A23456789102345678910A2345678910234567891023456789102345678910AA2345678910A2345678910AA2345678910AA23456789102345678910AAA2345678910AA23456789102345678910A234567891023456789102345678910A234567891023456789102345678910AAA23456789102345678910AAA2345678910234567891023456789102345678910AA23456789102345678910AAA2345678910AA23456789102345678910A234567891023456789102345678910A234567891023456789102345678910AAA2345678910A2345678910A2345678910AA23456789102345678910AAA23456789102345678910AA2345678910AA234567891023456789102345678910A23456789102345678910A2345678910234567891023456789102345678910AA2345678910A2345678910234567891023456789102345678910A234567891023456789102345678910AA2345678910A2345678910A2345678910AA234567891023456789102345678910A234567891023456789102345678910AA23456789102345678910AA2345678910A2345678910A2345678910A2345678910A2345678910AA23456789102345678910AAA2345678910AA2345678910234567891023456789102345678910A23456789102345678910AA23456789102345678910A23456789102345678910A2345678910A2345678910AA234567891023456789102345678910AA2345678910A2345678910A2345678910A23456789102345678910A23456789102345678910A2345678910A234567891023456789102345678910AAA2345678910AA2345678910AA234567891023456789102345678910AAAA2345678910A23456789102345678910A23456789102345678910A23456789102345678910A2345678910A234567891023456789102345678910A2345678910A2345678910AAA2345678910A234567891023456789102345678910AA2345678910AA234567891023456789102345678910AA23456789102345678910A2345678910A2345678910A2345678910AA2345678910234567891023456789102345678910AAA2345678910A234567891023456789102345678910A2345678910A23456789102345678910234567891023456789102345678910A2345678910A2345678910A234567891023456789102345678910A2345678910A2345678910A2345678910A2345678910AA23456789102345678910A234567891023456789102345678910AA23456789102345678910AA23456789102345678910A2345678910A2345678910AAA2345678910A2345678910A2345678910AAA23456789102345678910AAA23456789102345678910A23456789102345678910AA234567891023456789102345678910A2345678910A2345678910AA2345678910A23456789102345678910A234567891023456789102345678910AAA23456789102345678910AAA23456789102345678910A2345678910AAA23456789102345678910234567891023456789102345678910AA23456789102345678910A234567891023456789102345678910A23456789102345678910A23456789102345678910234567891023456789102345678910AA234567891023456789102345678910234567891023456789102345678910AAAA2345678910A" s=s.replace("2345678910","0") s=s.replace("A","1") print(s) for i in range(0,len(s),8):print(chr(int(s[i:i+8],2)),end="") print("\n")am = "SGFwcHkgdG8gdGVsbCB5b3Uga2V5IGlzIEtleXtPTUdfWW91ZG9pdH0=" print(base64.b64decode(am))得到的結果再base64解碼一次得到Happy to tell you key is Key{OMG_Youdoit}
所以k.zip的密碼就是OMG_Youdoit,得到的Ancient spells.txt里給出了提示
As long as you help me to fix, I’ll give you what you want.
(It Is Reverse Flag)
要修好它,得到的flag還是反向的
很明顯,老K的下面缺少一部分,那就拉高
這里跟V3師傅學了一招,修改jpg文件的寬高,在詳細信息里查看寬高數字,直接將其寬高值轉為16進制去010里搜
查看老K詳細信息。得到寬高為730×550
轉為16進制就是 2DA×226
010搜索 02 26
將其改為05 DC(高位1500)
修改高度
得到
Stegsolve打開
可以把圖片旋轉一下,然后硬看,結合出題人說的圖里的0當o、?@ 和 a 不要看混了、flag錯了多試幾遍,慢慢看
flag{Poker_F@ce}
總結
以上是生活随笔為你收集整理的BugkuCTF-MISC题Pokergame的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: React之类式组件
- 下一篇: php:// 协议