Misc

ez_QR

image-20250327170322802.png

一共有50个二维码,每个二维码对应一个字符,豆包写个python脚本

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
import os
import cv2

# 初始化空字符串用于存储拼接结果
result_string = ""

# 遍历 1 到 51 的图片
for i in range(1, 51):
# 构造图片文件名
image_name = f"{i}.png" # 假设图片格式为 PNG,可根据实际情况修改
# 检查图片文件是否存在
if os.path.exists(image_name):
try:
# 使用 OpenCV 读取图片
image = cv2.imread(image_name)
# 创建 QRCodeDetector 对象
qr_detector = cv2.QRCodeDetector()
# 解码二维码
retval, decoded_info, points, straight_qrcode = qr_detector.detectAndDecodeMulti(image)
if retval:
for data in decoded_info:
# 拼接结果
result_string += data
except Exception as e:
print(f"处理图片 {image_name} 时出错: {e}")
else:
print(f"图片 {image_name} 不存在。")

# 输出最终拼接结果
print("拼接后的字符串:", result_string)

image-20250327170041263.png

flag:QLNU{ZHe_sh1_y1_ge_Er_w31_m4_666_oovo_qaqqlnuyyds_ha_ha_ha!!!#1}

baby_MISC

image-20250327170631166.png

斯国一怎么就是四个1了,怎么读都不像呀,感觉是四多1

.\Decode.exe -X -P 1111 特别的人.mp3

  • -X是提取隐藏文件

  • -P是密码

  • 111为文件隐藏时的密码

  • 特别的人.mp3是要提取的文件

image-20250327173256608.png

我想要把16进制的上面这堆放在010那个区域的左边,但不管怎么能都是在右边

image-20250403232643338.png

怎么办???????

生日的祝福

image-20250402162103471.png

里面有段这个

1
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

Base64解码得到

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
table1= 'α'
table2= 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/'

def encrypt(text, shift):
encrypted_text = ""
for char in text:
if char.isalpha():
shifted = ord(char) + shift
if char.islower():
if shifted ord('z'):
shifted -= 26
elif shifted < ord('a'):
shifted += 26
elif char.isupper():
if shifted ord('Z'):
shifted -= 26
elif shifted < ord('A'):
shifted += 26
encrypted_text += chr(shifted)
else:
encrypted_text += char
return encrypted_text

encrypted_table1 = encrypt(table1,β)

# encrypted_table1= 'QRSTUVWqrstuvwxyzabcdefghijklmnopXYZABCDEFGHIJ0123456789+/KLMNOP'

flag = ""

for _ in range(?):
text1 = base64.b64encode(flag.encode(), altchars=table1.encode()).decode()

for _ in range(β):
en_flag = base64.b64encode(text1.encode(), altchars=table2.encode()).decode()
print(en_flag)<

将生日祝福以压缩包形式打开,需要密码,使用ARCHPR破解一下

image-20250403205440546.png

打开后是

1
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

frombase64的魔法棒一直点

image-20250403210318172.png

1
w8+8nMw3t8F2kGv3vNB9s9shjNcLhpTNt6TfmM7euLc9gnHMuqBmd8XDpDsSl5gSwqFGmMr/r8oSj7z8uEP5vz==

image-20250403210828381.png

image-20250403211454767.png

flag:QLNU{Y0u_@r4_gO0d_Ctfer!}

你是mvp还是躺赢狗?

image-20250403211619199.png

使用zip方式打开,是一张图

image-20250403211819348.png

注:IHDR 数据块,其标识为 “49 48 44 52”

有个问题,为啥会变成这样,就是把宽改了下

image-20250403212807765.png

image-20250403212833630.png

image-20250403212947992.png

image-20250403212901425.png

flag:QLNU{l00k_1n_My_3ye5_!}

奇怪的动图

image-20250403214737042.png

明文攻击

image-20250403215504225.png

拿到其中的文件

image-20250403221811148.png

image-20250403221835035.png

记事本替换一下

image-20250403222005629.png

使用python脚本转换为utf-8

1
2
3
4
5
6
7
8
9
10
11
12
13
14
binary_str = '0100000000110001010001100101111101101001001101010101111101100001011011010100000001111010001100010110111000111001'
# 按 8 位一组分割二进制字符串
bytes_list = [binary_str[i:i + 8] for i in range(0, len(binary_str), 8)]
# 转换为十进制整数列表
int_list = [int(byte, 2) for byte in bytes_list]
# 转换为字节对象
byte_obj = bytes(int_list)
try:
# 尝试以 UTF - 8 解码
utf8_text = byte_obj.decode('utf-8')
print("转换后的 UTF - 8 符号:", utf8_text)
except UnicodeDecodeError:
print("无法使用 UTF - 8 解码此二进制数据。")

image-20250403222312078.png

flag:QLNU{@1F_i5_am@z1n9}

NetTraffic

image-20250403225203779.png

分析TCP流

image-20250403225941709.png

密码:e45e329feb5d925b

image-20250403225832264.png

冰蝎的数据是ACE加密的

image-20250403231323628.png

image-20250403231339675.png

接着找

image-20250403231437288.png

flag:QLNU{b3h1NdEr_WebShEll_A_L1ttle_hArd}

Web

myjwt

image-20250330093508386.png

获得的令牌是eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VyIjoiZ3Vlc3QiLCJleHAiOjE3NDMzMDA4ODR9.ftDljpYTxsWKpL0S15_BZvNTsDfqPqKGek7NRbxtdnY

解码

image-20250330101525071.png

接着使用jwt_tool爆破得到秘钥,秘钥是12345678

image-20250330101404096.png

将guest改为admin,并重新生成jwt,使用bp加上Authorization头重新提交

image-20250330102048515.png

image-20250330102440409.png

flag:flag{1ef47ba1-9d70-4f0d-8330-59ba14e7b7a5}

泄露

dirsearch扫描

image-20250330104724844.png

git目录还原

image-20250330104816575.png

image-20250330104938735.png

image-20250330105214827.png

flag:QLNU{S1mpl3_g1t_AnD_sWp}

pppppyyyyyyyyyyyyyyyy

image-20250403222636026.png

image-20250403223805123.png

bp爆破一下

image-20250403223748726.png

image-20250403223936659.png

image-20250403223956979.png

问的豆包

image-20250403225038973.png

image-20250403224621970.png

image-20250403224652440.png

flag:QLNU{8beb2640-cf69-4a92-ac81-185d769d6205}

Crypto

ez_rsa

image-20250330102609565.png

这题是存AI呀,没学过算法

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# 扩展欧几里得算法,用于计算模逆元
def extended_gcd(a, b):
if a == 0:
return (b, 0, 1)
else:
g, y, x = extended_gcd(b % a, a)
return (g, x - (b // a) * y, y)

# 计算模逆元
def mod_inverse(a, m):
g, x, y = extended_gcd(a, m)
if g != 1:
raise Exception('Modular inverse does not exist')
else:
return x % m

# 定义给定的参数
p = 90387314829577654422580031074599849052489238017386590909427609518517830566632094153174983956061626373542148240632197282485834233498500360232839084537084441830816514377758069170092001168381491479309335271918675512196998198539464292877701133358699988066055212018603381917137199082127062670061784408062745010247
q = 131956964140437962238499019120856300797119073778027003002410884250396411838742340328080251408907361408806296819791922928892510090479973276769850659868697243411701946298190698869130430898400373194761890908225250866477990376871572627474128475108692336502916114993456438619932236295206409818033775388146000072237
e = 65537
c = 10410921907308276410589892193503777002613206525409600556582550130141239927384225094961244567250536114378262855720197279202379339896438970790676722385500897567129069224577416685817545829358494364962182199000462733858163411476930100883908770692701838181723658773973906387237278170734899690708594256204971349985771317564511229193597685929139414357691595246148020635838183673924739613551091535814336813669476452556824499750065035663728996877554070485866597029563465929590470889674480345186537435258607153437323899798451617074637518593529083308029187565110013064533249964278447406229869537622883525179107457102587647233026

# 计算 n 和 phi(n)
n = p * q
phi_n = (p - 1) * (q - 1)

# 计算私钥 d
d = mod_inverse(e, phi_n)

# 计算明文 m
m = pow(c, d, n)

# 将大整数转换为十六进制字符串
hex_str = hex(m)[2:]

# 确保十六进制字符串长度为偶数
if len(hex_str) % 2 != 0:
hex_str = '0' + hex_str

# 转换为字节数组并解码为UTF-8字符串
try:
byte_array = bytes.fromhex(hex_str)
plaintext = byte_array.decode('utf-8')
print("转换后的文本:", plaintext)
except UnicodeDecodeError:
print("无法解码为UTF-8文本")

image-20250330103911349.png

flag:QLNU{9f873f1c0315202caf47572a0bc24715}