threst's Blog

tjctf2018wp

2018/10/04 Share

Trippy

strings be37fef78cfd6c7deda71154f567e6d0cfefbda1f80698c064bab469d3a54c58_trippy.gif | grep tjctf

Interference

1.将v1和v2用stegsolveadd下,保存图片,在改变图片的偏移量,找到黑白的二维码,用windows反色,扫描出flag
2.compare v1.png v2.png output.png再把output.png用stegsolve调至黑白,windows反色.

Grid Parser

  1. 解压文件,发现有个password.png,用binwalk提取出zip,使用fcrackzip --brute-force --charset a1 --length 1-3 --use-unzip xxxx.zip,爆破出密码为px

直接stegsolve

Lexington State Bank

安装zsteg
gem install zsteg
直接命令zsteg lsb.png

Huuuuuge

nmap扫描
结果如下

1
2
3
4
5
6
7
8
9
10
11
Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-19 21:41 CST
Nmap scan report for 226.187.154.104.bc.googleusercontent.com (104.154.187.226)
Host is up (0.22s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp closed http
5901/tcp closed vnc-1
9418/tcp open git

Nmap done: 1 IP address (1 host up) scanned in 17.20 seconds

开放ssh和git,直接git clone git://104.154.187.226/huuuuuge失败,参考这个链接
用以下命令,正好题目说不要思考太深.
git clone --depth 1 git://104.154.187.226/huuuuuge

RC4 took an L

https://github.com/dstein64/LC4/blob/master/documentation.md

1
2
3
4
5
6
7
8
9
10
11
In [1]: import lc4

In [2]: key = "pq_xc589r3nb#mgjtkh7w2dlfvy4eaoi6uzs"

In [3]: encrypted = "wpwt#5ng4_qbitp#8mq59r_g866c4t59c6vy6tisj4af6bprfnbd_wrq2wjmr4ld_s26a7i#biiyqjolq8lus_wfus
...: fkj8xv2qrrv3etab_marovc#uuoueyl"

In [4]: decrypted = lc4.decrypt(key,encrypted)

In [5]: print(decrypted)
i_hope_that_by_making_this_long_you_will_assume_substitution_cipher_and_go_to_quip_qiup_the_flag_is#elsie_four_is_not_rc4
CATALOG
  1. 1. Trippy
  2. 2. Interference
  3. 3. Grid Parser
  4. 4. Weird Logo
  5. 5. Lexington State Bank
  6. 6. Huuuuuge
  7. 7. RC4 took an L