BUUCTF Misc部分WP

签到

flag{buu_ctf}

这是一个不能说的题目

下载文件后发现闪过几张图片

他们分别是:

即如下flag

flag{he11ohongke}

二维码

下载图片,扫描发现二维码不存在flag

丢进010

发现如图PK字样,猜测为zip压缩包,将后缀改为压缩包进行识别,发现有密码

提示为四位数密码 使用ARCHPR查看

发现这里踩到一个大坑,bandizip可以识别压缩包内容而ARCHPR则必须提取为纯净ZIP才可以爆破

提取后再次爆破

密码为7639 解压后拿到flag

文本内容:
CTF{vjpw_wnoei}
实际Flag应当为
flag{vjpw_wnoei}

你竟然赶我走

下图 丢进010 看文件末尾

(可以看的出来之里出题人在嘲讽拿LSB扫的笨比)

flag{stego_is_s0_bor1ing}

大白

题目提示的很明显了,图片尺寸有问题

直接丢近tweakpng

正确做法应该是拿py脚本修复图片尺寸 这里图方便直接改了

flag{He1l0_d4_ba1}

N种方法解决

下了是个exe 没法运行

丢010

老熟悉了 base64形式图片

二维码 扫

flag{dca57f966e4e4e31fd5b15417da63269}

乌镇峰会种图

同”你竟然赶我走“

flag{97314e7864a8f62627b26f3f998c37f1}

基础破解

四位密码 嗯扫就完了

密码为"2563"

内容一眼base64

flag{70354300a5100ba78068805661b93a5c}

wireshark

不会流量取证 下一个

文件中的秘密

方法与“你竟然赶我走”类似,翻两下就看到了

flag{870c5a72806115cb5439345d8b014396}

LSB

可以看到这个频道上藏了一条奇怪的东西

这样子dump就会得到一个二维码

flag{1sb_i4_s0_Ea4y}

zip伪加密

010发现头尾都真有加密

头尾都去掉就好了

flag{Adm1N-B2G-kU-SZIP}

rar

扫就做完了

flag{1773c5da790bd3caff38e3decd180eb7}

被嗅探的流量

同wireshark不会做

qr

flag{878865ce73370a4ce607d21ca01b5e59}

镜子里面的世界

LSB一圈啥也没有

丢zsteg看看

flag{st3g0_saurus_wr3cks}

ningen

依然是就差把答案糊脸上的题

010末端有个压缩包数据直接提取

flag{b025fc9ca797a67d2103bfbc407a6d5f}

小明的保险箱

同上

flag{75a3d68bf071ee188c418ea6cf0bb043}

爱因斯坦

同上但是密码藏图exif里

flag{dd22a92bf2cceb6c0cd0d6b83ff51606}

easycap

同wireshark不会

隐藏的钥匙

丢010翻出这么个东西

flag:base64:(Mzc3Y2JhZGRhMWVjYTJmMmY3M2QzNjI3Nzc4MWYwMGE=)

也就是说这是base64格式的密钥

flag{377cbadda1eca2f2f73d36277781f00a}

monster

还是丢010翻出个

01101011011011110110010101101011011010100011001101110011

第一印象是莫斯电码,但是后面觉得不太对,就试着用ascii码了

flag{koekj3s}

FLAG

没思路就一把梭

看到有个zip

### BUUCTF Miscellaneous Challenge Flag Solution For solving a BUUCTF miscellaneous challenge and finding the associated flag, one must approach such challenges methodically by understanding the provided materials or context within which the challenge operates. Since specific details about this particular BUUCTF misc challenge are not directly given here, general strategies can be outlined based on common practices in CTF (Capture The Flag) competitions. In many cases, flags for miscellaneous challenges follow certain patterns like `flag{...}` where ellipsis represents some text that needs to be discovered through problem-solving techniques relevant to the task at hand[^1]. Participants often need to apply skills ranging from steganography, cryptography, reverse engineering, to web exploitation depending upon what type of puzzle has been set up by organizers. To solve a miscellaneous challenge effectively: - Carefully read all information provided alongside the question. - Look out for any hidden messages embedded within images, audio files, or documents shared as part of the clue. - Experiment with different tools designed specifically for uncovering concealed data. - Consider how elements might relate back to known algorithms or protocols mentioned either explicitly or implicitly during the description. A concrete example cannot be demonstrated without knowing specifics about the current BUUCTF misc challenge being referred to because each scenario varies greatly in terms of required knowledge areas and methodologies employed. --related problems-- 1. What types of puzzles commonly appear under the category of miscellaneous in CTF events? 2. How does one prepare generally for tackling diverse kinds of challenges found in Capture The Flag contests? 3. Can you provide an overview of popular resources used when attempting to decode obscured communications encountered in CTF games? Note: Direct solutions including actual flags should typically come from participating officially in respective CTF activities rather than external sources so as not to compromise fairness among competitors.
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值