[安洵杯 2020]BeCare4
附件:帶密碼的flag.7z和npmtxt
將npmtxt拖入010,發現:
有一段故事,但故事之中有隱寫
密碼為RealV1siBle
以此密碼解壓flag.7z,得到Beauty_with_noword.jpg
使用silentEye解密:
[NSSRound#3 Team]funnypng
https://blog.csdn.net/gou1791241251/article/details/124809703
https://blog.csdn.net/qq_47875210/article/details/127719295
附件---funnypng.png
先使用stegsolve開啟檢視每個通道展示的圖片情況:
得到一半的二維碼,接下來就是找另一半二維碼
使用Data Extract檢視是否有LSB隱寫或者MSB隱寫(一般是低位隱寫),但是並沒有發現奇怪的地方
接著檢視圖片屬性:
位深度為48,比較大
加上使用stegsolve時發現A通道其實是空白,說明該圖片只有三個通道RGB,那麼每個通道深度為48/3=16bit,說明該圖片隱藏了另外的8bit的資訊
把原來的圖片所有畫素點修改之後,將深度改為8bit:
import png # pip install pypng
import time
img = png.Reader('funnypng.png')
imginfo = img.read()
w, h, imgdata = imginfo[:3]
data = []
for linedata in imgdata:
line = []
for d in linedata:
line.append(d%(2**8))
data.append(line)
with open('front2.png', 'wb') as f:
img2 = png.Writer(width=w, height=h, greyscale=False, bitdepth=8)
img2.write(f, data)
kali上執行
再用stegsolve開啟生成的front2.png,在Blue plane 0通道發現另一半二維碼:
將兩張二維碼進行拼接 553*278
對於這種有塗鴉的:QRazyBox----https://merri.cx/qrazybox/
NSSCTF{fbef863db8331e8c63f73d7a04c1cf5b}
[NSSRound#4 SWPU]Type Message
附件---D.wav、F.wav、M.wav、T.wav
透過dtmf2num解密:
D:\32.漏洞學習\misc\工具\音訊隱寫\dtmf2num>dtmf2num.exe F.wav
DTMF2NUM 0.2
by Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org
- open F.wav
wave size 89600
format tag 1
channels: 1
samples/sec: 16000
avg/bytes/sec: 32000
block align: 2
bits: 16
samples: 44800
bias adjust: 1
volume peaks: -32766 32766
normalize: 1
resampling to: 8000hz
- MF numbers: 7447
- DTMF numbers: 322217493
D:\32.漏洞學習\misc\工具\音訊隱寫\dtmf2num>dtmf2num.exe M.wav
DTMF2NUM 0.2
by Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org
- open M.wav
wave size 134400
format tag 1
channels: 1
samples/sec: 16000
avg/bytes/sec: 32000
block align: 2
bits: 16
samples: 67200
bias adjust: 0
volume peaks: -32764 32765
normalize: 2
resampling to: 8000hz
- MF numbers: 7744777
- DTMF numbers: 7333221535393
D:\32.漏洞學習\misc\工具\音訊隱寫\dtmf2num>dtmf2num.exe T.wav
DTMF2NUM 0.2
by Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org
- open T.wav
wave size 134400
format tag 1
channels: 1
samples/sec: 16000
avg/bytes/sec: 32000
block align: 2
bits: 16
samples: 67200
bias adjust: -2
volume peaks: -32765 32764
normalize: 3
resampling to: 8000hz
- MF numbers: 7777
- DTMF numbers: 3118161334374
即
627474238133
322217493
7333221535393
3118161334374
實際上是:(第3位是多餘的)
627474238133
32217493
733221535393
318161334374
其他WP提到的網站:http://dialabc.com/sound/detect/index.html
發現是手機鍵盤:
62 74 74 23 81 33 NSSCTF
32 21 74 93 EASY
73 32 21 53 53 93 REALLY
31 81 61 33 43 74 DTMFIS
即NSSCTF{DTMFISREALLYEASY}
[西湖論劍 2022]mp3
附件---cipher.mp3
foremost後得到一張png
然後使用zsteg:
zsteg mp3.png # 發現有
zsteg mp3.png -E 'b1,r,lsb,xy' > 1.zip # 提取壓縮包
獲得1.zip,但需要密碼
使用MP3Stego解密(預設無密碼即可),獲得cipher.mp3.txt
cipher.mp3.txt:
8750d5109208213f
用此密碼去解壓縮zip得47.txt
47.txt:
2lO,.j2lL000iZZ2[2222iWP,.ZQQX,2.[002iZZ2[2020iWP,.ZQQX,2.[020iZZ2[2022iWLNZQQX,2.[2202iW2,2.ZQQX,2.[022iZZ2[2220iWPQQZQQX,2.[200iZZ2[202iZZ2[2200iWLNZQQX,2.[220iZZ2[222iZZ2[2000iZZ2[2002iZZ2Nj2]20lW2]20l2ZQQX,2]202.ZW2]02l2]20,2]002.XZW2]22lW2]2ZQQX,2]002.XZWWP2XZQQX,2]022.ZW2]00l2]20,2]220.XZW2]2lWPQQZQQX,2]002.XZW2]0lWPQQZQQX,2]020.XZ2]20,2]202.Z2]00Z2]02Z2]2j2]22l2]2ZWPQQZQQX,2]022.Z2]00Z2]0Z2]2Z2]22j2]2lW2]000X,2]20.,2]20.j2]2W2]2W2]22ZQ-QQZ2]2020ZWP,.ZQQX,2]020.Z2]2220ZQ--QZ2]002Z2]220Z2]020Z2]00ZQW---Q--QZ2]002Z2]000Z2]200ZQ--QZ2]002Z2]000Z2]002ZQ--QZ2]002Z2]020Z2]022ZQ--QZ2]002Z2]000Z2]022ZQ--QZ2]002Z2]020Z2]200ZQ--QZ2]002Z2]000Z2]220ZQLQZ2]2222Z2]2000Z2]000Z2]2002Z2]222Z2]020Z2]202Z2]222Z2]2202Z2]220Z2]2002Z2]2002Z2]2202Z2]222Z2]2222Z2]2202Z2]2022Z2]2020Z2]222Z2]2220Z2]2002Z2]222Z2]2020Z2]002Z2]202Z2]2200Z2]200Z2]2222Z2]2002Z2]200Z2]2022Z2]200ZQN---Q--QZ2]200Z2]000ZQXjQZQ-QQXWXXWXj
由眾多相同的數字字母,猜測是需要rot
經嘗試,rot47後得到:
a=~[];a={___:++a,aaaa:(![]+"")[a],__a:++a,a_a_:(![]+"")[a],_a_:++a,a_aa:({}+"")[a],aa_a:(a[a]+"")[a],_aa:++a,aaa_:(!""+"")[a],a__:++a,a_a:++a,aa__:({}+"")[a],aa_:++a,aaa:++a,a___:++a,a__a:++a};a.a_=(a.a_=a+"")[a.a_a]+(a._a=a.a_[a.__a])+(a.aa=(a.a+"")[a.__a])+((!a)+"")[a._aa]+(a.__=a.a_[a.aa_])+(a.a=(!""+"")[a.__a])+(a._=(!""+"")[a._a_])+a.a_[a.a_a]+a.__+a._a+a.a;a.aa=a.a+(!""+"")[a._aa]+a.__+a._+a.a+a.aa;a.a=(a.___)[a.a_][a.a_];a.a(a.a(a.aa+"\""+a.a_a_+(![]+"")[a._a_]+a.aaa_+"\\"+a.__a+a.aa_+a._a_+a.__+"(\\\"\\"+a.__a+a.___+a.a__+"\\"+a.__a+a.___+a.__a+"\\"+a.__a+a._a_+a._aa+"\\"+a.__a+a.___+a._aa+"\\"+a.__a+a._a_+a.a__+"\\"+a.__a+a.___+a.aa_+"{"+a.aaaa+a.a___+a.___+a.a__a+a.aaa+a._a_+a.a_a+a.aaa+a.aa_a+a.aa_+a.a__a+a.a__a+a.aa_a+a.aaa+a.aaaa+a.aa_a+a.a_aa+a.a_a_+a.aaa+a.aaa_+a.a__a+a.aaa+a.a_a_+a.__a+a.a_a+a.aa__+a.a__+a.aaaa+a.a__a+a.a__+a.a_aa+a.a__+"}\\\"\\"+a.a__+a.___+");"+"\"")())();
放到控制檯執行即可得DASCTF{f8097257d699d7fdba7e97a15c4f94b4}
[GKCTF 2021]excel騷操作
附件---flag.xlsx
隨便點幾個單元格發現有些單元格為1,有些為空:
選中一個有1的單元格後進行替換:
生成:
修改列寬:
長得有些奇怪的二維碼---漢信碼
線上漢信碼識別:https://tuzim.net/hxdecode/