Trippy
strings be37fef78cfd6c7deda71154f567e6d0cfefbda1f80698c064bab469d3a54c58_trippy.gif | grep tjctf
Interference
1.将v1和v2用stegsolveadd
下,保存图片,在改变图片的偏移量,找到黑白的二维码,用windows反色,扫描出flag
2.compare v1.png v2.png output.png
再把output.png用stegsolve调至黑白,windows反色.
Grid Parser
- 解压文件,发现有个
password.png
,用binwalk
提取出zip,使用fcrackzip --brute-force --charset a1 --length 1-3 --use-unzip xxxx.zip
,爆破出密码为px
Weird Logo
直接stegsolve
Lexington State Bank
安装zsteggem install zsteg
直接命令zsteg lsb.png
Huuuuuge
nmap扫描
结果如下1
2
3
4
5
6
7
8
9
10
11Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-19 21:41 CST
Nmap scan report for 226.187.154.104.bc.googleusercontent.com (104.154.187.226)
Host is up (0.22s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp closed http
5901/tcp closed vnc-1
9418/tcp open git
Nmap done: 1 IP address (1 host up) scanned in 17.20 seconds
开放ssh和git,直接git clone git://104.154.187.226/huuuuuge
失败,参考这个链接
用以下命令,正好题目说不要思考太深.git clone --depth 1 git://104.154.187.226/huuuuuge
RC4 took an L
https://github.com/dstein64/LC4/blob/master/documentation.md
1 | In [1]: import lc4 |