杂烩/Misc Chowder(186 solved)
题目附件:
链接:https://pan.baidu.com/s/1Wb6cCIUundA-rCmQ-eJNLw
提取码:tk2t
比赛放的hint:
1、流量包中的网络连接对解题没有帮助 The network connection in pcap is not helping to the challenge
2、不需要访问流量里任何一个的服务器地址,所有数据都可以从流量包里直接提取 Do not need to connect the network, every data can be extracted from the pcap
3、In the burst test point of compressed packet password, the length of the password is 6, and the first two characters are “D” and “E”. 压缩包密码暴破考点中,密码的长度为6位,前两位为DE
1、用foremosr分离出6张模模糊糊的jpg
2、导出http对象,扒出6张jpg和1张链接png
png图片中的链接如下:
https://drive.google.com/file/d/1JBdPj7eRaXuLCTFGn7AluAxmxQ4k1jvX/view
下载后得到readme.docx,binwalk分离出一个加密的You_found_me_Orz.zip
根据后来放的hint,掩码爆破,睡一觉,爆出来了
从You_found_me_Orz.zip中的jpg分离出rar
但是666.jpg在ubuntu打不开,用file命令得知是png(也能用HxD看出)
3、666.png是ADS隐写,用ntfsstreamseditor.exe能看到
life(29 solved)
链接:https://pan.baidu.com/s/14S_ddf1i6u1LWmrlC43-Lg
提取码:j52i
题目描述:No Game No Life!
1、在game.jpg中分离出一个加密的flag.zip和passphare.png
2、这个png是27*27的,不是二维码
赛后知道有个生命游戏模拟器
手动填充点点
点击单步
得到:AJTC8ADEVRA13AR,能解开flag.zip
3、解开是txt.pilf.txt,flip意为翻转
0QjN1MTM0MTN0QjN3ImNjNzM3QTNmdTN3MTNmdzMzcjNxcjM3QTNmdDN2gzMzUjZ2czM0YDZzMjMxcDZ
str = "0QjN1MTM0MTN0QjN3ImNjNzM3QTNmdTN3MTNmdzMzcjNxcjM3QTNmdDN2gzMzUjZ2czM0YDZzMjMxcDZ"
print(str[::-1])
ZDcxMjMzZDY0Mzc2ZjUzMzg2NDdmNTQ3MjcxNjczMzdmNTM3NTdmNTQ3MzNjNmI3NjQ0NTM0MTM1NjQ0
base64 decode得到:d71233d64376f5338647f54727167337f53757f54733c6b7644534135644
再翻转,得到:4465314354467b6c33745f75735f73376172745f7468335f67346d33217d
hex转ascii。
Easy Protocol(14 solved)
这道题俺一点思路都没有,有一些内网的东西
hint.txt的意思就是flag的3部分都是8位纯数字
###part1.pcapng
1、par1.pcapng中出现了tcp、ldap、krb5协议,将protocol排序
搜一下这个kerberos协议
kerberos协议参考:
Kerberos协议探索系列之扫描与爆破篇
Windows内网协议学习Kerberos篇之TGSREQ& TGSREP
看到67和70帧都有De1ctf关键字,在TGS-REP的ticket(票据)中找到cipher
hashcat爆破参考:https://www.freebuf.com/sectool/164507.html
在hashcat wiki找到kerberos 5
的格式:
构造好hashcat支持的hash值:
$krb5tgs\(23\)De1CTF2020\(TEST.LOCAL\)part1/De1CTF2020$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
hashcat64.exe -m 13100 test1.txt ?d?d?d?d?d?d?d?d -a 3 --force --show
part2.pcapng
Ctrl+F,搜索关键字De1ctf
有关kerberos协议的ASREQ & ASREP认证模块,参考:http://www.secwk.com/2019/11/05/13711/
part2:$krb5asrep\(23\)De1CTF2020@TEST.LOCAL:2a00ca98642914e2cebb2718e79cbfb6$9026dd00f0b130fd4c4fd71a80817ddd5aec619a9b2e9b53ae2309bde0a9796ebcfa90558e8aaa6f39350b8f6de3a815a7b62ec0c154fe5e2802070146068dc9db1dc981fb355c94ead296cdaefc9c786ce589b43b25fb5b7ddad819db2edecd573342eaa029441ddfdb26765ce01ff719917ba3d0e7ce71a0fae38f91d17cf26d139b377ea2eb5114a2d36a5f27983e8c4cb599d9a4a5ae31a24db701d0734c79b1d323fcf0fe574e8dcca5347a6fb98b7fc2e63ccb125a48a44d4158de940b4fd0c74c7436198380c03170835d4934965ef6a25299e3f1af107c2154f40598db8600c855b2b183
hashcat64.exe -m 18200 test2.txt ?d?d?d?d?d?d?d?d -a 3 --force --show
part3.pcapng
Ctrl+F,在第68,69帧找到De1ctf关键字,搜搜这个NTLM,存在NTML身份认证(参考:Windows身份认证及利用思路
Windows下的密码hash——NTLM hash和Net-NTLM hash介绍
Windows内网协议学习NTLM篇之NTLM基础介绍)
从第68帧看出这里是Net-NTLM v2
part3:De1CTF2020::TEST:56886f90fcb73ded:b5991cc2a0d585d0f813358eaafc7412:0101000000000000130cb9102308d601d2290bc0c25617a80000000002000800540045005300540001000c0044004d0032003000310032000400140074006500730074002e006c006f00630061006c000300220064006d0032003000310032002e0074006500730074002e006c006f00630061006c000500140074006500730074002e006c006f00630061006c0007000800130cb9102308d60106000400020000000800300030000000000000000000000000100000ecaa3d44ddc464026c453206813aafa0b918f2ad43d497ef8fb6beb2083258a40a0010000000000000000000000000000000000009001e0048005400540050002f0074006500730074002e006c006f00630061006c000000000000000000
hashcat64.exe -m 5600 test3.txt ?d?d?d?d?d?d?d?d -a 3 --force --show
De1ctf官方wp
参考:[De1ctf官方wp](https://blog.de1ta.club/2020/05/06/de1ctf2020 Writeup/?nsukey=2MztwSn2rsJ/UJYF/CFdXLdjyoX9EE8SWmAJCOVVaQCZl2OjgMRb7oldu/2gW6ajWo/sDjBJ6IRAIPsmapgxj14/q1I4V78bzrm5/IWzdW4XZ2PqW7L2zVURhQG0gGSpcb8rrhAl93l/wa0hUC/xvxt01v7qjlmj0rc7YZi26g/Dq0RRGZlpDzmD3hp9i1JCBHNtGhBQelLO4NbEWHV9/Q==#menu)