misc
1
6个dll文件,发现一个文件包含zip文件头,一个文件包含zip文件尾,将zip头与含zip尾的文件拼接,用360压缩可打开得到flag,也可以手动修复,只保留txt文件



2
给了一个加密的zip文件,文件名经过base64加密,判断为密码,解压后也是个相同形式的zip文件,python解
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
|
import os import base64
filePath = '/tmp/Recurzip' num = 0 while True: for i,j,k in os.walk(filePath): enpassword1 = k[0][0:-4] filename1 = k[0] ext1 = k[0][-3:] enpassword2 = k[1][0:-4] filename2 = k[1] ext2 = k[1][-3:]
if ext1 == 'zip': password = base64.b64decode(enpassword1) os.system('unzip -P ' + password + ' '+ filename1) os.system('rm ' + enpassword1 + ".zip") elif ext2 == 'zip': password = base64.b64decode(enpassword2) os.system('unzip -P ' + password + ' '+ filename2) os.system('rm ' + enpassword2 + ".zip") else: os.system('cat flag.txt') exit()
num += 1 print(num)
|

crypro
Ladder
1
| GN2WUSTOLFYTCWKQLFLG65KBNVDEGMRUMMZTM4LVOFUG2R3LMNWTKTCMGVWVUR3WOM3HONDNMV3UOOKDM4ZWUTDIK5FGOY3EJV4VIMKFJUYVUWLQGJRUGYLCOQ3HG6LVHFXUC3TKJRSW6RDLNFFEWZ2TG4======
|
1 2 3 4 5 6 7 8 9 10
| #base32 3ujJnYq1YPYVouAmFC24c36quqhmGkcm5LL5mZGvs6w4mewG9Cg3jLhWJgcdMyT1EM1ZYp2cCabt6syu9oAnjLeoDkiJKgS7 #base58 B3ubcEe7waVuE55z96FTrO8JvfuevhFXEhXqzkWINOiIaRd4OlGLhL5jgqUXaQRwNC0CXl #base62 O0lPbGM2Vz9PJUc7RVNyMFFeWVlDaSFJIzg3Yy1wQDNkWE1JLw== #base64 ;IOlc6W?O%G;ESr0Q^YYCi!I#87c-p@3dXMI/ #base85 RaziCTF{w3_G0t_4ll_tHe_Ba$3s}
|

A rEal gAME
1
| RDT4VA__A1$rtL{E__0UP4UDASIUIY3}aDDO_LCR_H
|
W型栅栏3栏解密发现flag格式
1
| RratDLD{TED_4_O0VU_PA4LU_DCA_SRIAU_I1YH3$}
|
steganography
culture
zsteg一键看
1
| RaziCTF{i_s33_ur_4_MaN_0f_LSB_aS_W3LL}
|
##