MISC
真正的CTFer
- 题目描述

- 解题过程
- 下载附件解压得到一张图片,如下

- 丢进kali中发现无法正常显示,猜测图片高度隐写,使用winhex修改高度,如下

- 修改高度后得到完成图片如下

- 放大后在弹幕处找到flag如下

FLAG:flag{d2b5543c2f8aa8229057872dd85ce5a9}
解不开的秘密
- 题目描述

- 解题步骤
- 下载附件并解压,附件中有两个文件,一个是 file ,另外一个 word 文档需要输入密码 , 观察发现 file中是 hex 编码 , 先 hex 解码 ,后 base64 解码 ,得到如下内容
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\RealVNC]
[HKEY_CURRENT_USER\Software\RealVNC\vnclicensewiz]
"_AnlClientId"="8f5cc378-2e1d-4670-80e0-d2d81d882561"
"_AnlSelected"="0"
"_AnlInclRate"="0.0025"
[HKEY_CURRENT_USER\Software\RealVNC\vncserver]
[HKEY_CURRENT_USER\Software\RealVNC\VNCViewer4]
"dummy"=""
[HKEY_CURRENT_USER\Software\RealVNC\VNCViewer4\MRU]
"00"="127.0.0.1"
"Order"=hex:00,01
"01"="127.0.0.1:5900"
[HKEY_CURRENT_USER\Software\RealVNC\WinVNC4]
"Password"=hex:37,5e,be,86,70,b3,c6,f3
"SecurityTypes"="VncAuth"
"ReverseSecurityTypes"="None"
"QueryConnect"=dword:00000000
"PortNumber"=dword:0000170c
"LocalHost"=dword:00000000
"IdleTimeout"=dword:00000e10
"HTTPPortNumber"=dword:000016a8
"Hosts"="+,"
"AcceptKeyEvents"=dword:00000001
"AcceptPointerEvents"=dword:00000001
"AcceptCutText"=dword:00000001
"SendCutText"=dword:00000001
"DisableLocalInputs"=dword:00000000
"DisconnectClients"=dword:00000001
"AlwaysShared"=dword:00000000
"NeverShared"=dword:00000000
"DisconnectAction"="None"
"RemoveWallpaper"=dword:00000000
"RemovePattern"=dword:00000000
"DisableEffects"=dword:00000000
"UseHooks"=dword:00000001
"PollConsoleWindows"=dword:00000001
"CompareFB"=dword:00000001
"Protocol3.3"=dword:00000000
"dummy"=""
- 解码后的内容很容易看出来是 vnc 注册表内容,根据“"Password"=hex:37,5e,be,86,70,b3,c6,f3”可使用 vnc 解密工具解出 vnc 密码 , 得到密码 “ !QAZ2wsx ” , 结果如下 :

参考资料:VNC密码破解
-
尝试使用该密码解 word 文档 ,成功 。 打开 word 文档, 发现“ Flag 就在这里“字样下面配图片,如下图所示
图片.png
-
移除图片,发现存在影藏字体,如下:

- 修改图片颜色,得到flag

网友评论