Chybeta

BugsBunnyCTF2017-misc-writeup

单刷好幸苦。

MISC

Not found

1
hidden in plain sight

在注册时时候就注意到有irc页面,连上去后得到flag

1
Bugs_Bunny{Th1s_1s_0ur_fl4g_f0rm4t}

Primitive encryption

题目给了如下信息:

1
2
3
4
5
What about a time travel ? ^^
Your mission is to be very observative, sometimes a theory start from a supposition.
Decrypt this and you will get your flag :
i KTAX ZTRTRTC SuB AKXy KXlp you GiRViRF youN GlTF TRV iA'C FFAKTAwTCXTCy
To validate the challenge enter : Bugs_Bunny{your_flag_uppercase}

考虑语义,进行如下替换:

1
2
3
4
5
6
7
8
9
10
K -> h
X -> e
N -> r
A -> t
C -> s
T -> a
R -> R
V -> e
G -> F
F -> g

得到:

1
i hate Zararas SuB they help you fireirg your flag are it's ggthatwaseasy

ggthatwaseasy改成大写加上外围后得到flag:

1
Bugs_Bunny{GGTHATWASEASY}

Like a Boss !

1
Put the flag between Bugs_Bunny{}

Locked PDF

1
My girlfriend sent me a locked PDF file ,Can you please helps me to read the content ,maybe something great waiting fro me ?!! :p

Steganography

Stego10

题目提供了一张图片。

1
2
3
4
5
6
root@chybeta:~/Desktop/bug/steg# strings h4cker.jpg
JFIF
`Exif
Google
0220
.Bugs_Bunny{0258c4a75fc36076b41d02df8074372b}

odd & even 2

1
2
3
4
5
odd and even are two friends since ever.
Can you detach them.
Be the devil and do it.
flag : BUGS_BUNNY{}

Forensics

FOR25

1
I found this file in my computer ,could you please give me the flag ?!

直接用strings看一下。

用以下脚本提取出hex。

1
2
3
4
5
6
7
8
9
file = open('hex','rb')
output = open('output','wb')
while True:
line = file.readline()
output.write(line[9:48]+"\n")
if not line:
break
file.close()
output.close()

然后将output中的内容放到hex编辑器中并保存在压缩包文件。压缩包中有文件hex.png。得到flag:

1
Bugs_Bunny{Y0u_D1D_1T_W3ll}

UNKOWN file !!

1
? em rof ti evlos esaelp uoy dluoc, rekcah boon a m'I, elif egnarts a em dnes evah dneirf ym

题目是倒这个,这是个提示。用hex打开unknown文件,发现是个png文件,只是被倒序了。将其十六进制内容保存在unknownhex.txt中,用下面这个脚本转换一下:

1
2
3
4
5
6
7
8
unknowhex = open('unkownhex.txt','rb')
knowhex = open('knowhex.txt','wb')
content = unknowhex.readline()
content = content.split(' ')
for i in content[::-1]:
knowhex.write(i+' ')
unknowhex.close()
knowhex.close()

再把knowhex.txt的内容放到hex编辑器中并保存成png文件。打开后是倒着的flag。最后的flag为:

1
Bugs_Bunny{E4Sy_T4Sk_F0R_H4X0r_L1KeS_Y0u}

For80

把gif传到这网站后,进行split。但是图片很不清晰。然后我选择把分帧的图片下载下来。其目录结构差不多如下:

然后用下面这个脚本写个html页面,用这些分帧图片进行填充。

1
2
3
4
5
html = open("flag.html","wb")
for i in range(310):
img = '<img src="img/frame_' + str(i)+ '_delay-0.01s.gif" />'
html.writelines(img)
html.close()

有些地方重叠了,但不妨碍最后的flag:

1
Bugs_Bunny{S3nD_NuDes_DuD3}

Give me the Flag !

task85的压缩包解压出来后有个flag.rar和flag文件夹。flag文件夹里有各种国旗还有二维码碎片。而flag.rar被加密了。初步推测通过回复二维码来解密压缩包。拼了好久。。

扫码得到:

1
== 34Sy_P4SSW0Rd_H4X0r ==

直接解压得到的flag.txt里有flag。直接打开压缩包里面有个readme.txt,输入密码后其内容为:

1
01000010 01110101 01100111 01110011 01011111 01000010 01110101 01101110 01101110 01111001 01111011 00110010 01100010 00111001 00110111 00110010 00110110 00110011 01100010 01100101 01100010 00110111 00110000 01100100 00110000 01100110 00110110 00110101 00111001 01100010 01100100 01100010 00111001 00110011 01100011 01100011 00110101 00110010 00111001 00110001 01100100 00110000 01100001 01111101

放到 http://tool.ph0en1x.com 上解一下,得到flag:

1
Bugs_Bunny{2b97263beb70d0f659bdb93cc5291d0a}

Programation

ZERO-ONE !

写程序把ZERON,ONE换成对应的0,1,之后再解码就行了。脚本如下:

1
2
3
progfile = open("progTask.txt","rb")
content = progfile.readline()
print(content.replace("ZERO",'0').replace("ONE","1").replace(" ",""))

http://tool.ph0en1x.com 放入bin一栏,在ascii一栏得到如下:

1
QnVnc19CdW5ueXswNWZlODIzOGNmZWUxZTVmMDRiNjUzMzliZWE0ZmVkMn0=

进行base64解码,得到flag:

1
Bugs_Bunny{05fe8238cfee1e5f04b65339bea4fed2}

点击赞赏二维码,您的支持将鼓励我继续创作!
chybeta WeChat Pay

微信打赏

chybeta Alipay

支付宝打赏

本文标题:BugsBunnyCTF2017-misc-writeup

文章作者:chybeta

发布时间:2017年07月30日 - 09:07

最后更新:2017年07月31日 - 08:07

原始链接:http://chybeta.github.io/2017/07/30/BugsBunnyCTF2017-misc-writeup/

许可协议: 署名-非商业性使用-禁止演绎 4.0 国际 转载请保留原文链接及作者。