buuctf misc部分wp

本文档详细介绍了BuUCTF比赛中的Misc部分的解题过程,包括图片处理、文件分析、密码破解、网络嗅探等多个环节,涉及png图片高度修改、archpr爆破、二维码扫描、Wireshark导出HTTP对象等技术。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

求关注公众号 lin先森
在这里插入图片描述

大白 | png图片改高度

png图片改高度
[外链图片转存失败(img-PojN2D3v-1567086301372)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2321)]

基础破解 | archpr爆破

你竟然赶我走 | 打开

010editor打开 最后面flag

ningen | easy

binwalk
foremost
爆破

LSB | ss

[外链图片转存失败(img-3ZEH1eki-1567086301372)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2322)]

[外链图片转存失败(img-73OkHr5k-1567086301373)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2323)]

save bin
二维码扫描

rar | archpr爆破

qr | 二维码扫描

乌镇峰会种图 | 记事本打开

wireshark | 导出http对象

导出http对象
搜索flag

[外链图片转存失败(img-yRdrxVGS-1567086301373)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2324)]
找到password

文件中的秘密 | 右键属性

假如给我三天光明

盲文
wav文件
audacity打开
摩尔斯密码

来首歌吧 | 摩尔斯密码

镜子里面的世界 | ss

[外链图片转存失败(img-hwXdn7em-1567086301374)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2325)]

爱因斯坦

binwalk
foremost
图片属性
this_is_not_password
为解压密码

小明的保险箱

binwalk
foremost
爆破四位数字密码

FLAG

ss打开
[外链图片转存失败(img-KTNksaov-1567086301375)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2326)]

save bin
解压缩 一个elf文件
ida打开看到hctf

strings 1 | grep “hctf”

easycap

追踪tcp流

被嗅探的流量

导出http对象
一个php文件 实际上不是php 用010editor打开 十六进制视图
flag

梅花香之苦寒来

010editor打开 后面很多0-9 a-f

with open('1.txt','r') as h:
    h=h.read()
bb = ''
tem=''
for i in range(0,len(h),2):
    tem='0x'+h[i]+h[i+1]
    tem=int(tem,base=16)
    bb += (chr(tem))

with open('2.txt','w') as ff:
	ff.write(bb)

[外链图片转存失败(img-YNWznUSR-1567086301375)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2327)]

with open('2.txt','r') as f:
	f = f.read()
b = open('3.txt','w')
for i in f.split('\n'):
	b.write(i.lstrip('(').rstrip(')').replace(',',' ')+'\n')

[外链图片转存失败(img-bveFTjxS-1567086301375)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2328)]

gnuplot
plot ‘3.txt’

https://tu.sioe.cn/gj/huidu/
灰度处理

后门查杀

d盾扫一下

[外链图片转存失败(img-whpjC0No-1567086301376)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2329)]

snake

binwalk
foremost
base64

https://blog.youkuaiyun.com/zz_Caleb/article/details/91973626

http://serpent.online-domain-tools.com/

[外链图片转存失败(img-Xyvb5Jvq-1567086301376)(evernotecid://74A3E6DA-E009-4797-AA60-5DEED9FE4F7A/appyinxiangcom/23464203/ENResource/p2330)]

a = '''C	T	F	{	w	h	o	_	k	n	e	w	_	s	e	r
p	e	n	t	_	c	i	p	h	e	r	_	e	x	i	s
t	e	d	}	.'''
print a.replace(' ','').replace('	','').replace('\n','')

荷兰宽带数据泄露

RouterPassView
打开
搜索username

九连环

binwalk
foremost
steghide info xx.jpg

steghide extract -sf xx.jpg

ko.txt

解压

另外一个世界

记事本打开
最后010
八个一组 转字符

import binascii

a = 
### BUUCTF Miscellaneous Challenge Flag Solution For solving a BUUCTF miscellaneous challenge and finding the associated flag, one must approach such challenges methodically by understanding the provided materials or context within which the challenge operates. Since specific details about this particular BUUCTF misc challenge are not directly given here, general strategies can be outlined based on common practices in CTF (Capture The Flag) competitions. In many cases, flags for miscellaneous challenges follow certain patterns like `flag{...}` where ellipsis represents some text that needs to be discovered through problem-solving techniques relevant to the task at hand[^1]. Participants often need to apply skills ranging from steganography, cryptography, reverse engineering, to web exploitation depending upon what type of puzzle has been set up by organizers. To solve a miscellaneous challenge effectively: - Carefully read all information provided alongside the question. - Look out for any hidden messages embedded within images, audio files, or documents shared as part of the clue. - Experiment with different tools designed specifically for uncovering concealed data. - Consider how elements might relate back to known algorithms or protocols mentioned either explicitly or implicitly during the description. A concrete example cannot be demonstrated without knowing specifics about the current BUUCTF misc challenge being referred to because each scenario varies greatly in terms of required knowledge areas and methodologies employed. --related problems-- 1. What types of puzzles commonly appear under the category of miscellaneous in CTF events? 2. How does one prepare generally for tackling diverse kinds of challenges found in Capture The Flag contests? 3. Can you provide an overview of popular resources used when attempting to decode obscured communications encountered in CTF games? Note: Direct solutions including actual flags should typically come from participating officially in respective CTF activities rather than external sources so as not to compromise fairness among competitors.
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值