<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>NotionNext BLOG</title>
        <link>https://tangly1024.com/</link>
        <description>这是一个由NotionNext生成的站点</description>
        <lastBuildDate>Tue, 30 May 2023 12:04:29 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>zh-CN</language>
        <copyright>All rights reserved 2023, Dr34m</copyright>
        <item>
            <title><![CDATA[祥云杯misc/re]]></title>
            <link>https://tangly1024.com/article/4</link>
            <guid>https://tangly1024.com/article/4</guid>
            <pubDate>Mon, 31 Oct 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[被密码爷带飞的比赛]]></description>
            <content:encoded><![CDATA[<div id="container" class="mx-auto undefined"><main class="notion light-mode notion-page notion-block-efe355f0dba343a3b4ea40997ad51f3c"><div class="notion-viewport"></div><div class="notion-collection-page-properties"></div><h2 class="notion-h notion-h1 notion-h-indent-0 notion-block-7a90ca464d2640318520d31275783839" data-id="7a90ca464d2640318520d31275783839"><span><div id="7a90ca464d2640318520d31275783839" class="notion-header-anchor"></div><a class="notion-hash-link" href="#7a90ca464d2640318520d31275783839" title="MISC"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">MISC</span></span></h2><h3 class="notion-h notion-h2 notion-h-indent-1 notion-block-e5e83d02bc3e438b9d9884c0a6f201f0" data-id="e5e83d02bc3e438b9d9884c0a6f201f0"><span><div id="e5e83d02bc3e438b9d9884c0a6f201f0" class="notion-header-anchor"></div><a class="notion-hash-link" href="#e5e83d02bc3e438b9d9884c0a6f201f0" title="strange_forensics"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>strange_forensics</b></span></span></h3><div class="notion-text notion-block-3a28f4b2a61d4a09a43799ab9826bcf4"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://fahriguresci.com/create-specific-volatility-profile-and-symbol-table/">学习链接1</a></div><div class="notion-text notion-block-b759a14965e2401691718cbe4e3e8d71">首先，是一个linux取证，需要得到这个镜像的版本号</div><div class="notion-text notion-block-d4d8a314c1574d3e832594f13923372c">使用命令这边只用vol3有这个命令，如果是对于linux取证的话</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">#vol3
vol -f 1.mem banners</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-1f934482a182422a8b775f895d37ea49"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F0c21c08c-ddea-462f-9227-669bc366aa1a%2Fimage_(15).png?table=block&amp;id=1f934482-a182-422a-8b77-5f895d37ea49" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-6e46672111b84bd8bd45d8cf59f7b21e">得到版本</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">Linux version 5.4.0-84-generic (buildd@lcy01-amd64-007) (gcc version 7.5.0 (Ubuntu 7.5.0-3ubuntu1~18.04)) #94~18.04.1-Ubuntu SMP Thu Aug 26 23:17:46 UTC 2021 (Ubuntu 5.4.0-84.94~18.04.1-generic 5.4.133)</code></pre><div class="notion-text notion-block-c20cb860a4744da1bfd1460fb3c3622a">然后我们要构建一个跟这个内核一样，记住是一模一样的内核。</div><h4 class="notion-h notion-h3 notion-h-indent-2 notion-block-0bde4b69d6864bd49628d9f0d058e136" data-id="0bde4b69d6864bd49628d9f0d058e136"><span><div id="0bde4b69d6864bd49628d9f0d058e136" class="notion-header-anchor"></div><a class="notion-hash-link" href="#0bde4b69d6864bd49628d9f0d058e136" title="ps:踩坑"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>ps:踩坑</b></span></span></h4><div class="notion-text notion-block-a6d33582b32c4519ab39d992b53f9f08">这边就不能使用上面学习链接中的做法使用vol3去拉出内核，我具体原因也不知道是为什么，最后会导致本来好好的，amd64-007变成amd64-046</div><div class="notion-text notion-block-33404c13befa4c19b3a4366d85122252">就使用字符表+dwarf的方式制作内核调试信息的文件</div><div class="notion-text notion-block-c5eb522dccc445be81f6becc65637a73"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://blog.csdn.net/weixin_46081055/article/details/121897319">学习链接2</a></div><div class="notion-text notion-block-d4dc17452bee403993c9cd64bc97a54b">安装部分就不讲解了，我们需要去安装一个18.04的ubuntu，在装完之后需要uname -a 查看一下自己内核版本能不能对上，然后需要在这个ubuntu上下一个volatility2，进行dwarf的编译</div><h4 class="notion-h notion-h3 notion-h-indent-2 notion-block-fc8f022aaaed4c518f216f80367427b9" data-id="fc8f022aaaed4c518f216f80367427b9"><span><div id="fc8f022aaaed4c518f216f80367427b9" class="notion-header-anchor"></div><a class="notion-hash-link" href="#fc8f022aaaed4c518f216f80367427b9" title="1.创建vtypes"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>1.创建vtypes</b></span></span></h4><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">cd volatility/tools/linux
make</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-5b4a2a0b2e824fd3abb6c807ecea1993"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fbf5b7ca2-8391-4e6c-b215-f835aceda441%2Fimage_(16).png?table=block&amp;id=5b4a2a0b-2e82-4fd3-abb6-c807ecea1993" alt="notion image" loading="lazy" decoding="async"/></div></figure><h4 class="notion-h notion-h3 notion-h-indent-2 notion-block-5bb8ebe78984487992cb2df12e36f2f8" data-id="5bb8ebe78984487992cb2df12e36f2f8"><span><div id="5bb8ebe78984487992cb2df12e36f2f8" class="notion-header-anchor"></div><a class="notion-hash-link" href="#5bb8ebe78984487992cb2df12e36f2f8" title="2.获取符号表"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>2.获取符号表</b></span></span></h4><div class="notion-text notion-block-b6d8e93b0827404e82cce5cb382ff6d4">一般我们可以在/boot目录下找到该System.map文件。该文件包含系统的符号信息。</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-712cfb95744647dca0154b39aaa03b1e"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fc4f80f0a-b97b-4f8a-9f4b-d3c162e5929f%2Fimage_(17).png?table=block&amp;id=712cfb95-7446-47dc-a015-4b39aaa03b1e" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-31eb97121a1643c78f0683d76de517ef">这个就是我们所需要的符号表了</div><h4 class="notion-h notion-h3 notion-h-indent-2 notion-block-d598fee322344cf6b0b70aab8890587e" data-id="d598fee322344cf6b0b70aab8890587e"><span><div id="d598fee322344cf6b0b70aab8890587e" class="notion-header-anchor"></div><a class="notion-hash-link" href="#d598fee322344cf6b0b70aab8890587e" title="3.制作用户配置文件"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>3.制作用户配置文件</b></span></span></h4><div class="notion-text notion-block-6d4f4bd52ccd42e9b4907322080549fe">将moudle.dwarf以及system.map文件打包成一个zip文件</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">sudo zip ./volatility/plugins/overlays/linux/Ubuntu.zip ./tools/linux/module.dwarf /boot/System.map-`uname -r`</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-72b95c409b674b0691c07b33873c099b"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F6f9061c5-9446-40e8-9e01-4425161d03cd%2Fimage_(18).png?table=block&amp;id=72b95c40-9b67-4b06-91c0-7b33873c099b" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-d86684b56a8e444591e1bd4192f501f2">这样我们一个可以调试的内核就制作好了</div><h4 class="notion-h notion-h3 notion-h-indent-2 notion-block-1c68c0438c7b4548ab84f46f08d38254" data-id="1c68c0438c7b4548ab84f46f08d38254"><span><div id="1c68c0438c7b4548ab84f46f08d38254" class="notion-header-anchor"></div><a class="notion-hash-link" href="#1c68c0438c7b4548ab84f46f08d38254" title="4.开始做题"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>4.开始做题</b></span></span></h4><div class="notion-text notion-block-689cf75787ea4c47a6183dea67cc2280">然后我们回到自己的kali虚拟机,使用vol2，将Ubuntu.zip放到自己的//volatility-master/volatility/plugins/linux/目录下</div><div class="notion-text notion-block-5c1f11b3cc3c4d3a816b36925f422bf7">查看info</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">python2 vol.py --info</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-681dcd69dc2e4a58b610d99c4f4bc280"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F5ac1b7be-7fec-4758-8665-380a5d21a4cc%2Fimage_(19).png?table=block&amp;id=681dcd69-dc2e-4a58-b610-d99c4f4bc280" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-240ee97c7e9949bb8ea6138c4a6c2108">第一个就是，我们选用这个作为我们的profiles</div><div class="notion-text notion-block-54f3682898b94594a951f3f1b1084a97">LinuxUbuntux64</div><div class="notion-text notion-block-2e30cb072c684533856be7d59bd44fa4">分享一个师傅的blog，里面有几篇关于linux 取证的分析 <a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://blog.csdn.net/NFMSR?type=blog">大佬博客</a></div><div class="notion-text notion-block-0626efd56e654a20a3b537f05df31cff">以及linux取证下的命令 <a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://github.com/volatilityfoundation/volatility">官网</a></div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-e48e3ce86d984bd9a82a280b6656f7d4"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Ff1c62345-761a-4e04-8287-fa37c37b209b%2Fimage_(20).png?table=block&amp;id=e48e3ce8-6d98-4bd9-a82a-280b6656f7d4" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-7a711021a1524bf6b37cbc6d45def22b">密码在/etc/shadow 下</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">python2 vol.py -f 1.mem --profile=LinuxUbuntux64 linux_enumerate_files | grep &#x27;shadow&#x27;</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-196ef88ad5d84afab89845ebc2861ee9"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F59f171e1-5216-497c-bec0-48ce2070f75b%2Fimage_(21).png?table=block&amp;id=196ef88a-d5d8-4afa-b898-45ebc2861ee9" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-30ae750c610d472ab3677ebe1b52c463">然后将这个文件dump下来</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">python2 vol.py -f 1.mem --profile=LinuxUbuntux64 linux_find_file -i 0xffff97ce7444b448 -O shadow</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-3b4576435f544f95b0bdb64755b13dec"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F1d5d2ec3-710c-4bc8-983f-589efb7eab29%2Fimage_(22).png?table=block&amp;id=3b457643-5f54-4f95-b0bd-b64755b13dec" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-e7b158eaa46446ca88ee70047ebea89a">拿到了</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-3c48db30ee2e4ea7bd0ad1f8ac6cad3b"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F98fc635b-8cda-45d1-a2e8-d034135df8aa%2Fimage_(23).png?table=block&amp;id=3c48db30-ee2e-4ea7-bd0a-d1f8ac6cad3b" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-27744688ce1d49a7bf90b92f7b84a775">直接somd5解</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-702aa6e951da478ca0f48acdf10a95bc"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F21bb41a5-cef7-403c-be79-40bfd20dac60%2Fimage_(24).png?table=block&amp;id=702aa6e9-51da-478c-a0f4-8acdf10a95bc" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-52dc8ea650f44490bd47906589113a66">拿到密码</div><div class="notion-text notion-block-c2c6782c6bc24a1d8438222b7ffecf0e">然后查看文件</div><div class="notion-text notion-block-06fd5a7911374d7a9ec17051f240dd0d">恢复文件的元数据：包括 文件大小，MACtimes，权限，所有者，等等</div><div class="notion-text notion-block-7b7a570d7be549ffa110324006844f3d">为了获取完整的数据，命令必须以root权限运行</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">python2 vol.py -f 1.mem --profile=LinuxUbuntux64 linux_recover_filesystem -D dum</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-2a9104ea2acb4ed2b7221d860ad972b6"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fafca551e-4f76-45a6-9067-0637b5187631%2Fimage_(25).png?table=block&amp;id=2a9104ea-2acb-4ed2-b722-1d860ad972b6" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-ace8099754ca466fb3ea187f478a6725">可以在/home/bob/Desktop目录下找到一个secret.zip文件</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-e578b80225b14bbfb6fb323b18d3e26a"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F620b9b40-ac6c-4889-b38f-0e1cb3469cc2%2Fimage_(26).png?table=block&amp;id=e578b802-25b1-4bbf-b6fb-323b18d3e26a" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-c39197fc6ad44dfeb581d432bcf6b596">是一个伪无密，把两个加密数据块的0000改成0900就可以爆破了</div><div class="notion-text notion-block-f2df1a6e9a4a4287ac6dfb8eeae07a65">爆破密码得到第二部分flag</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-d6838c48839d4f9584a644630fc00741"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F443215b5-54b5-4dce-893a-b6d351f0c343%2Fimage_(27).png?table=block&amp;id=d6838c48-839d-4f95-84a6-44630fc00741" alt="notion image" loading="lazy" decoding="async"/></div></figure><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-591ceb7212ac4c5f992c4e60ad2cd3a7"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fe53c2394-05f5-4edf-a5f9-5ad3b88fca71%2Fimage_(28).png?table=block&amp;id=591ceb72-12ac-4c5f-992c-4e60ad2cd3a7" alt="notion image" loading="lazy" decoding="async"/></div></figure><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">_y0u_Ar3_tHe_LIn</code></pre><div class="notion-text notion-block-d20b7d4b9dc54142b072dd535d49808f">第三部分flag，应该是非预期，直接在010里面搜索，flag3，就可以得到第三部分flag</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-9a98b2e952b04a848b360ab20c24ce2a"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fae3a8373-d363-4248-b718-9727ec997db7%2Fimage_(29).png?table=block&amp;id=9a98b2e9-52b0-4a84-8b36-0ab20c24ce2a" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-5638ad5c12cb448f8ca87590517403d6">最后得到完整的flag</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">flag{890topico_y0u_Ar3_tHe_LInUx_forEnsIcS_MASTER}</code></pre><div class="notion-text notion-block-70ee74924c244363ad465a57cef14f72">从而可以引出更多的非预期</div><div class="notion-blank notion-block-d68d283f8bb3446e93a7a988b0df6b8e"> </div><div class="notion-text notion-block-449198fc07ca4f3db3d01e15a9ee3c0c">在010直接搜索gdm-password，稍微翻一下，只有110个搜索</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-7ca1bca1fc53473ca797dd0c761c6b59"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F89195cc8-b7cd-4f26-b267-4f4e8246ea3d%2Fimage_(30).png?table=block&amp;id=7ca1bca1-fc53-473c-a797-dd0c761c6b59" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-4efeac7b598240a5b0918b22f645d47d">可以直接得到密码，gdm-password是root密码</div><div class="notion-text notion-block-4391009fba124522b12f7cbca0895782">然后binwalk -e可以直接将zip分离出来，就是小心内存炸了，所以从理论上来说，这道题甚至不用配profile。</div><h4 class="notion-h notion-h3 notion-h-indent-2 notion-block-afd090b20c4f408b8529368e14819010" data-id="afd090b20c4f408b8529368e14819010"><span><div id="afd090b20c4f408b8529368e14819010" class="notion-header-anchor"></div><a class="notion-hash-link" href="#afd090b20c4f408b8529368e14819010" title="总结"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>总结</b></span></span></h4><div class="notion-text notion-block-0a194540d5e947049a24c3534a9a6544">这题主要是考察linux镜像取证，主要难点就是配linux镜像，后面就没有什么难得了。</div><h2 class="notion-h notion-h1 notion-h-indent-0 notion-block-aa55c2940c9b4caabdf2d39778676d50" data-id="aa55c2940c9b4caabdf2d39778676d50"><span><div id="aa55c2940c9b4caabdf2d39778676d50" class="notion-header-anchor"></div><a class="notion-hash-link" href="#aa55c2940c9b4caabdf2d39778676d50" title="REVERSE"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>REVERSE</b></span></span></h2><h3 class="notion-h notion-h2 notion-h-indent-1 notion-block-338f31616f584eb6b48f06e9a30aa289" data-id="338f31616f584eb6b48f06e9a30aa289"><span><div id="338f31616f584eb6b48f06e9a30aa289" class="notion-header-anchor"></div><a class="notion-hash-link" href="#338f31616f584eb6b48f06e9a30aa289" title="rocket"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>rocket</b></span></span></h3><div class="notion-text notion-block-9f7efdffba0a41d1ae06e73264d619a8">装一个ubuntu22.04，以及8.2的racket。官网的rocket是8.6版本的，所以要去历史里面下载</div><div class="notion-text notion-block-e4b670da6cb14e8a8b5e2885e7c508e2"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://download.racket-lang.org/releases/8.2/">racket8.2</a></div><div class="notion-text notion-block-d5cc6e23642f4d659cd70d45e191aee4">下载下来是一个.sh文件，直接./运行即可</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-5ed8c05f891b4adc9310909b870a1882"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F0af274eb-9a29-4dd8-8a1e-2d052989c83d%2Fimage_(31).png?table=block&amp;id=5ed8c05f-891b-4adc-9310-909b870a1882" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-09544f44c93248608efadc3cc012df13">output是一串值，估计是flag，我们先不去管它</div><div class="notion-text notion-block-b304b65f8a4740bfa84af33733de1597">装好之后运行./chall 会让你输入一个值，然后输出到output（这边有一个坑，因为output不能被覆盖，不知道是不是我虚拟机的问题，需要每次都去删掉output）</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-95ff1c67cfa74732a5b345d2bf1f0f9c"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F4ad624f7-edf8-42e5-9e0c-43fcbd4f40be%2Fimage_(32).png?table=block&amp;id=95ff1c67-cfa7-4732-a5b3-45d2bf1f0f9c" alt="notion image" loading="lazy" decoding="async"/></div></figure><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-fb32f5711408418fa32d041095f840f8"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F60e7ed30-3a7b-4e8e-a14c-145433197b37%2Fimage_(33).png?table=block&amp;id=fb32f571-1408-418f-a32d-041095f840f8" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-09172cca264c4f828983a903a6f802c4">这边输入一个1跟一个b，因为1跟b的ascii码正好是2倍，也好找规律。看到输入一个字符之后得到了一个值，我们可以猜测是经过了某种运算，又因为我们设定了1跟b，所以将这两个值相除一下，正好是8倍，我们就猜测，中间的运算是将字符的ASCII值进行了3次方</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-python">import base64
import string
import math
from Crypto.Util.number import *
import gmpy2

print(ord(&#x27;b&#x27;))
print(ord(&#x27;1&#x27;),117649,941192)
print(941192/117649)
print(chr(ord(&#x27;1&#x27;)*2))</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-d4bbf31ad31c46b6a02614533c612eae"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fe2476567-f10c-4529-8c66-adc2c1691439%2Fimage_(34).png?table=block&amp;id=d4bbf31a-d31c-46b6-a026-14533c612eae" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-6a319f1c985645089377b130c32ece1c">我们就将output中的值开三次方根，然后直接转字符，就可以得到flag</div><figure class="notion-asset-wrapper notion-asset-wrapper-embed notion-block-48d2b36f60e14a0fb32a9e9b27ed8ecf"></figure><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-python">import base64
import string
import math
from Crypto.Util.number import *
import gmpy2

print(ord(&#x27;b&#x27;))
print(ord(&#x27;1&#x27;),117649,941192)
print(941192/117649)
print(chr(ord(&#x27;1&#x27;)*2))
print(long_to_bytes(gmpy2.iroot(7212272804013543391008421832457418223544765489764042171135982569211377620290274828526744558976950004052088838419495093523281490171119109149692343753662521483209758621522737222024221994157092624427343057143179489608942837157528031299236230089474932932551406181,3)[0]))

</code></pre><h3 class="notion-h notion-h2 notion-h-indent-1 notion-block-00dc59007298450fa5812ecb43158849" data-id="00dc59007298450fa5812ecb43158849"><span><div id="00dc59007298450fa5812ecb43158849" class="notion-header-anchor"></div><a class="notion-hash-link" href="#00dc59007298450fa5812ecb43158849" title="engtom"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>engtom</b></span></span></h3><div class="notion-text notion-block-9a6e1d44eb7949fdada3eeb950ddadc4">又是一个需要搭建环境的题，这次比赛搭建环境的题是真的多，尝试了20.04跟22.04的ubuntu不能搭建，然后尝试用18.04成功</div><div class="notion-text notion-block-f03c4f7c566c4bf0837bbc9ca804ae65">首先拿到一个chall.snapshot文件，不知道是什么，打开010，发现文件头是JRRYF，想到了之前做的某个比赛中也有类似的文件，是使用的<a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://github.com/jerryscript-project/jerryscript">jerryscript</a>,可惜环境早就删了，重新搭一个</div><figure class="notion-asset-wrapper notion-asset-wrapper-embed notion-block-d297971ff5d24e1bb8ffbe65d3cdeadd"></figure><div class="notion-text notion-block-64ca398763024f9db64dd5a7fef483cb">上官网，直接使用他给的命令，一键部署</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">sudo apt-get install gcc gcc-arm-none-eabi cmake cppcheck clang-format-10 python
python3 tools/build.py  #不能使用python，因为Ubuntu默认python是2.7，会导致编译失败</code></pre><h4 class="notion-h notion-h3 notion-h-indent-2 notion-block-2cedd071fea94c6b96106f788da4a6a5" data-id="2cedd071fea94c6b96106f788da4a6a5"><span><div id="2cedd071fea94c6b96106f788da4a6a5" class="notion-header-anchor"></div><a class="notion-hash-link" href="#2cedd071fea94c6b96106f788da4a6a5" title="ps：踩坑"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title"><b>ps：踩坑</b></span></span></h4><div class="notion-text notion-block-61f4ea2dcf7b44bdad5f5251ee1cd3a9">在直接运行的时候，会有报错</div><div class="notion-text notion-block-94b1b3bc86084a3a850afa9a14bdce01">在查询了多方文档之后（真的坑，基本找不到文档），<a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://gitee.com/RT-Thread-Mirror/submod_jerryscript/blob/master/docs/01.CONFIGURATION.md">文档</a>，发现要将几个接口给ON起来，否则会不能用</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-f5b4c97a29fb4cfb8dd208c63dffc3ae"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F8ee029e2-54c4-462f-a6bb-d84b8c5cc388%2Fimage_(37).png?table=block&amp;id=f5b4c97a-29fb-4cfb-8dd2-08c63dffc3ae" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-3e6aeb82d34d4cc2a1a55ec9c9ff8f07">至于怎么找到这几个命令，可以使用-h来查询命令</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-3ee993a6ce184651a7c040b3c8167fa6"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F7bc028e9-849a-4217-b4d2-64a5c4680c54%2Fimage_(38).png?table=block&amp;id=3ee993a6-ce18-4651-a7c0-40b3c8167fa6" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-7f151a72a85046328bf657ce55b910de">然后执行</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">./jerry --show-opcodes --exec-snapshot chall.snapshot</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-ea48890e01034eb294c3278d1faa718a"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F24129c8e-3601-45b7-9f9c-bafb8ce1c8a8%2Fimage_(39).png?table=block&amp;id=ea48890e-0103-4eb2-94c3-278d1faa718a" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-89db866ba329445b837451170f09af1e">然后就可以分析字节码了</div><div class="notion-text notion-block-fab7a2fe167440f0af7692b693211681">得到</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">Byte code dump:

  Maximum stack depth: 38
  Flags: [small_lit_enc]
  Argument range end: 0
  Register range end: 5
  Identifier range end: 30
  Const literal range end: 91
  Literal range end: 101

   0 : CBC_CHECK_VAR ident:5-&gt;string(SboxTable)
   2 : CBC_CHECK_VAR ident:6-&gt;string(CK)
   4 : CBC_CHECK_VAR ident:7-&gt;string(FK)
   6 : CBC_CHECK_VAR ident:8-&gt;string(bigxor)
   8 : CBC_CHECK_VAR ident:9-&gt;string(leftshift)
  10 : CBC_CHECK_VAR ident:10-&gt;string(prefixInteger)
  12 : CBC_CHECK_VAR ident:11-&gt;string(sm4Sbox)
  14 : CBC_CHECK_VAR ident:12-&gt;string(GET_ULONG_BE)
  16 : CBC_CHECK_VAR ident:13-&gt;string(PUT_ULONG_BE)
  18 : CBC_CHECK_VAR ident:14-&gt;string(sm4_getkey)
  20 : CBC_CHECK_VAR ident:15-&gt;string(encrypt)
  22 : CBC_CHECK_VAR ident:16-&gt;string(decrypt_sm4)
  24 : CBC_CHECK_VAR ident:17-&gt;string(compare_array)
  26 : CBC_CHECK_VAR ident:18-&gt;string(input)
  28 : CBC_CHECK_VAR ident:19-&gt;string(num)
  30 : CBC_CHECK_VAR ident:20-&gt;string(message)
  32 : CBC_CHECK_VAR ident:21-&gt;string(count)
  34 : CBC_CHECK_VAR ident:22-&gt;string(pad_len)
  36 : CBC_CREATE_VAR_EVAL ident:5-&gt;string(SboxTable)
  38 : CBC_CREATE_VAR_EVAL ident:6-&gt;string(CK)
  40 : CBC_CREATE_VAR_EVAL ident:7-&gt;string(FK)
  42 : CBC_CREATE_VAR_FUNC_EVAL lit:91 ident:8-&gt;string(bigxor)
  45 : CBC_CREATE_VAR_FUNC_EVAL lit:92 ident:9-&gt;string(leftshift)
  48 : CBC_CREATE_VAR_FUNC_EVAL lit:93 ident:10-&gt;string(prefixInteger)
  51 : CBC_CREATE_VAR_FUNC_EVAL lit:94 ident:11-&gt;string(sm4Sbox)
  54 : CBC_CREATE_VAR_FUNC_EVAL lit:95 ident:12-&gt;string(GET_ULONG_BE)
  57 : CBC_CREATE_VAR_FUNC_EVAL lit:96 ident:13-&gt;string(PUT_ULONG_BE)
  60 : CBC_CREATE_VAR_FUNC_EVAL lit:97 ident:14-&gt;string(sm4_getkey)
  63 : CBC_CREATE_VAR_FUNC_EVAL lit:98 ident:15-&gt;string(encrypt)
  66 : CBC_CREATE_VAR_FUNC_EVAL lit:99 ident:16-&gt;string(decrypt_sm4)
  69 : CBC_CREATE_VAR_FUNC_EVAL lit:100 ident:17-&gt;string(compare_array)
  72 : CBC_CREATE_VAR_EVAL ident:18-&gt;string(input)
  74 : CBC_CREATE_VAR_EVAL ident:19-&gt;string(num)
  76 : CBC_CREATE_VAR_EVAL ident:20-&gt;string(message)
  78 : CBC_CREATE_VAR_EVAL ident:21-&gt;string(count)
  80 : CBC_CREATE_VAR_EVAL ident:22-&gt;string(pad_len)
  82 : CBC_PUSH_LITERAL ident:23-&gt;string(Array)
  84 : CBC_NEW0
  85 : CBC_ASSIGN_SET_IDENT ident:5-&gt;string(SboxTable)
  87 : CBC_PUSH_LITERAL_PUSH_NUMBER_0 ident:5-&gt;string(SboxTable)
  89 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:214
  92 : CBC_PUSH_NUMBER_POS_BYTE number:144
  94 : CBC_PUSH_NUMBER_POS_BYTE number:233
  96 : CBC_PUSH_NUMBER_POS_BYTE number:254
  98 : CBC_PUSH_NUMBER_POS_BYTE number:204
 100 : CBC_PUSH_NUMBER_POS_BYTE number:225
 102 : CBC_PUSH_NUMBER_POS_BYTE number:61
 104 : CBC_PUSH_NUMBER_POS_BYTE number:183
 106 : CBC_PUSH_NUMBER_POS_BYTE number:22
 108 : CBC_PUSH_NUMBER_POS_BYTE number:182
 110 : CBC_PUSH_NUMBER_POS_BYTE number:20
 112 : CBC_PUSH_NUMBER_POS_BYTE number:194
 114 : CBC_PUSH_NUMBER_POS_BYTE number:40
 116 : CBC_PUSH_NUMBER_POS_BYTE number:251
 118 : CBC_PUSH_NUMBER_POS_BYTE number:44
 120 : CBC_PUSH_NUMBER_POS_BYTE number:5
 122 : CBC_NEW byte_arg:16
 124 : CBC_ASSIGN_BLOCK
 125 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:1
 128 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:43
 131 : CBC_PUSH_NUMBER_POS_BYTE number:103
 133 : CBC_PUSH_NUMBER_POS_BYTE number:154
 135 : CBC_PUSH_NUMBER_POS_BYTE number:118
 137 : CBC_PUSH_NUMBER_POS_BYTE number:42
 139 : CBC_PUSH_NUMBER_POS_BYTE number:190
 141 : CBC_PUSH_NUMBER_POS_BYTE number:4
 143 : CBC_PUSH_NUMBER_POS_BYTE number:195
 145 : CBC_PUSH_NUMBER_POS_BYTE number:170
 147 : CBC_PUSH_NUMBER_POS_BYTE number:68
 149 : CBC_PUSH_NUMBER_POS_BYTE number:19
 151 : CBC_PUSH_NUMBER_POS_BYTE number:38
 153 : CBC_PUSH_NUMBER_POS_BYTE number:73
 155 : CBC_PUSH_NUMBER_POS_BYTE number:134
 157 : CBC_PUSH_NUMBER_POS_BYTE number:6
 159 : CBC_PUSH_NUMBER_POS_BYTE number:153
 161 : CBC_NEW byte_arg:16
 163 : CBC_ASSIGN_BLOCK
 164 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:2
 167 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:156
 170 : CBC_PUSH_NUMBER_POS_BYTE number:66
 172 : CBC_PUSH_NUMBER_POS_BYTE number:80
 174 : CBC_PUSH_NUMBER_POS_BYTE number:244
 176 : CBC_PUSH_NUMBER_POS_BYTE number:145
 178 : CBC_PUSH_NUMBER_POS_BYTE number:239
 180 : CBC_PUSH_NUMBER_POS_BYTE number:152
 182 : CBC_PUSH_NUMBER_POS_BYTE number:122
 184 : CBC_PUSH_NUMBER_POS_BYTE number:51
 186 : CBC_PUSH_NUMBER_POS_BYTE number:84
 188 : CBC_PUSH_NUMBER_POS_BYTE number:11
 190 : CBC_PUSH_NUMBER_POS_BYTE number:67
 192 : CBC_PUSH_NUMBER_POS_BYTE number:237
 194 : CBC_PUSH_NUMBER_POS_BYTE number:207
 196 : CBC_PUSH_NUMBER_POS_BYTE number:172
 198 : CBC_PUSH_NUMBER_POS_BYTE number:98
 200 : CBC_NEW byte_arg:16
 202 : CBC_ASSIGN_BLOCK
 203 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:3
 206 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:228
 209 : CBC_PUSH_NUMBER_POS_BYTE number:179
 211 : CBC_PUSH_NUMBER_POS_BYTE number:28
 213 : CBC_PUSH_NUMBER_POS_BYTE number:169
 215 : CBC_PUSH_NUMBER_POS_BYTE number:201
 217 : CBC_PUSH_NUMBER_POS_BYTE number:8
 219 : CBC_PUSH_NUMBER_POS_BYTE number:232
 221 : CBC_PUSH_NUMBER_POS_BYTE number:149
 223 : CBC_PUSH_NUMBER_POS_BYTE number:128
 225 : CBC_PUSH_NUMBER_POS_BYTE number:223
 227 : CBC_PUSH_NUMBER_POS_BYTE number:148
 229 : CBC_PUSH_NUMBER_POS_BYTE number:250
 231 : CBC_PUSH_NUMBER_POS_BYTE number:117
 233 : CBC_PUSH_NUMBER_POS_BYTE number:143
 235 : CBC_PUSH_NUMBER_POS_BYTE number:63
 237 : CBC_PUSH_NUMBER_POS_BYTE number:166
 239 : CBC_NEW byte_arg:16
 241 : CBC_ASSIGN_BLOCK
 242 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:4
 245 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:71
 248 : CBC_PUSH_NUMBER_POS_BYTE number:7
 250 : CBC_PUSH_NUMBER_POS_BYTE number:167
 252 : CBC_PUSH_NUMBER_POS_BYTE number:252
 254 : CBC_PUSH_NUMBER_POS_BYTE number:243
 256 : CBC_PUSH_NUMBER_POS_BYTE number:115
 258 : CBC_PUSH_NUMBER_POS_BYTE number:23
 260 : CBC_PUSH_NUMBER_POS_BYTE number:186
 262 : CBC_PUSH_NUMBER_POS_BYTE number:131
 264 : CBC_PUSH_NUMBER_POS_BYTE number:89
 266 : CBC_PUSH_NUMBER_POS_BYTE number:60
 268 : CBC_PUSH_NUMBER_POS_BYTE number:25
 270 : CBC_PUSH_NUMBER_POS_BYTE number:230
 272 : CBC_PUSH_NUMBER_POS_BYTE number:133
 274 : CBC_PUSH_NUMBER_POS_BYTE number:79
 276 : CBC_PUSH_NUMBER_POS_BYTE number:168
 278 : CBC_NEW byte_arg:16
 280 : CBC_ASSIGN_BLOCK
 281 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:5
 284 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:104
 287 : CBC_PUSH_NUMBER_POS_BYTE number:107
 289 : CBC_PUSH_NUMBER_POS_BYTE number:129
 291 : CBC_PUSH_NUMBER_POS_BYTE number:178
 293 : CBC_PUSH_NUMBER_POS_BYTE number:113
 295 : CBC_PUSH_NUMBER_POS_BYTE number:100
 297 : CBC_PUSH_NUMBER_POS_BYTE number:218
 299 : CBC_PUSH_NUMBER_POS_BYTE number:139
 301 : CBC_PUSH_NUMBER_POS_BYTE number:248
 303 : CBC_PUSH_NUMBER_POS_BYTE number:235
 305 : CBC_PUSH_NUMBER_POS_BYTE number:15
 307 : CBC_PUSH_NUMBER_POS_BYTE number:75
 309 : CBC_PUSH_NUMBER_POS_BYTE number:112
 311 : CBC_PUSH_NUMBER_POS_BYTE number:86
 313 : CBC_PUSH_NUMBER_POS_BYTE number:157
 315 : CBC_PUSH_NUMBER_POS_BYTE number:53
 317 : CBC_NEW byte_arg:16
 319 : CBC_ASSIGN_BLOCK
 320 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:6
 323 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:30
 326 : CBC_PUSH_NUMBER_POS_BYTE number:36
 328 : CBC_PUSH_NUMBER_POS_BYTE number:14
 330 : CBC_PUSH_NUMBER_POS_BYTE number:94
 332 : CBC_PUSH_NUMBER_POS_BYTE number:99
 334 : CBC_PUSH_NUMBER_POS_BYTE number:88
 336 : CBC_PUSH_NUMBER_POS_BYTE number:209
 338 : CBC_PUSH_NUMBER_POS_BYTE number:162
 340 : CBC_PUSH_NUMBER_POS_BYTE number:37
 342 : CBC_PUSH_NUMBER_POS_BYTE number:34
 344 : CBC_PUSH_NUMBER_POS_BYTE number:124
 346 : CBC_PUSH_NUMBER_POS_BYTE number:59
 348 : CBC_PUSH_NUMBER_POS_BYTE number:1
 350 : CBC_PUSH_NUMBER_POS_BYTE number:33
 352 : CBC_PUSH_NUMBER_POS_BYTE number:120
 354 : CBC_PUSH_NUMBER_POS_BYTE number:135
 356 : CBC_NEW byte_arg:16
 358 : CBC_ASSIGN_BLOCK
 359 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:7
 362 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:212
 365 : CBC_PUSH_NUMBER_0
 366 : CBC_PUSH_NUMBER_POS_BYTE number:70
 368 : CBC_PUSH_NUMBER_POS_BYTE number:87
 370 : CBC_PUSH_NUMBER_POS_BYTE number:159
 372 : CBC_PUSH_NUMBER_POS_BYTE number:211
 374 : CBC_PUSH_NUMBER_POS_BYTE number:39
 376 : CBC_PUSH_NUMBER_POS_BYTE number:82
 378 : CBC_PUSH_NUMBER_POS_BYTE number:76
 380 : CBC_PUSH_NUMBER_POS_BYTE number:54
 382 : CBC_PUSH_NUMBER_POS_BYTE number:2
 384 : CBC_PUSH_NUMBER_POS_BYTE number:231
 386 : CBC_PUSH_NUMBER_POS_BYTE number:160
 388 : CBC_PUSH_NUMBER_POS_BYTE number:196
 390 : CBC_PUSH_NUMBER_POS_BYTE number:200
 392 : CBC_PUSH_NUMBER_POS_BYTE number:158
 394 : CBC_NEW byte_arg:16
 396 : CBC_ASSIGN_BLOCK
 397 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:8
 400 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:234
 403 : CBC_PUSH_NUMBER_POS_BYTE number:191
 405 : CBC_PUSH_NUMBER_POS_BYTE number:138
 407 : CBC_PUSH_NUMBER_POS_BYTE number:210
 409 : CBC_PUSH_NUMBER_POS_BYTE number:64
 411 : CBC_PUSH_NUMBER_POS_BYTE number:199
 413 : CBC_PUSH_NUMBER_POS_BYTE number:56
 415 : CBC_PUSH_NUMBER_POS_BYTE number:181
 417 : CBC_PUSH_NUMBER_POS_BYTE number:163
 419 : CBC_PUSH_NUMBER_POS_BYTE number:247
 421 : CBC_PUSH_NUMBER_POS_BYTE number:242
 423 : CBC_PUSH_NUMBER_POS_BYTE number:206
 425 : CBC_PUSH_NUMBER_POS_BYTE number:249
 427 : CBC_PUSH_NUMBER_POS_BYTE number:97
 429 : CBC_PUSH_NUMBER_POS_BYTE number:21
 431 : CBC_PUSH_NUMBER_POS_BYTE number:161
 433 : CBC_NEW byte_arg:16
 435 : CBC_ASSIGN_BLOCK
 436 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:9
 439 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:224
 442 : CBC_PUSH_NUMBER_POS_BYTE number:174
 444 : CBC_PUSH_NUMBER_POS_BYTE number:93
 446 : CBC_PUSH_NUMBER_POS_BYTE number:164
 448 : CBC_PUSH_NUMBER_POS_BYTE number:155
 450 : CBC_PUSH_NUMBER_POS_BYTE number:52
 452 : CBC_PUSH_NUMBER_POS_BYTE number:26
 454 : CBC_PUSH_NUMBER_POS_BYTE number:85
 456 : CBC_PUSH_NUMBER_POS_BYTE number:173
 458 : CBC_PUSH_NUMBER_POS_BYTE number:147
 460 : CBC_PUSH_NUMBER_POS_BYTE number:50
 462 : CBC_PUSH_NUMBER_POS_BYTE number:48
 464 : CBC_PUSH_NUMBER_POS_BYTE number:245
 466 : CBC_PUSH_NUMBER_POS_BYTE number:140
 468 : CBC_PUSH_NUMBER_POS_BYTE number:177
 470 : CBC_PUSH_NUMBER_POS_BYTE number:227
 472 : CBC_NEW byte_arg:16
 474 : CBC_ASSIGN_BLOCK
 475 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:10
 478 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:29
 481 : CBC_PUSH_NUMBER_POS_BYTE number:246
 483 : CBC_PUSH_NUMBER_POS_BYTE number:226
 485 : CBC_PUSH_NUMBER_POS_BYTE number:46
 487 : CBC_PUSH_NUMBER_POS_BYTE number:130
 489 : CBC_PUSH_NUMBER_POS_BYTE number:102
 491 : CBC_PUSH_NUMBER_POS_BYTE number:202
 493 : CBC_PUSH_NUMBER_POS_BYTE number:96
 495 : CBC_PUSH_NUMBER_POS_BYTE number:192
 497 : CBC_PUSH_NUMBER_POS_BYTE number:41
 499 : CBC_PUSH_NUMBER_POS_BYTE number:35
 501 : CBC_PUSH_NUMBER_POS_BYTE number:171
 503 : CBC_PUSH_NUMBER_POS_BYTE number:13
 505 : CBC_PUSH_NUMBER_POS_BYTE number:83
 507 : CBC_PUSH_NUMBER_POS_BYTE number:78
 509 : CBC_PUSH_NUMBER_POS_BYTE number:111
 511 : CBC_NEW byte_arg:16
 513 : CBC_ASSIGN_BLOCK
 514 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:11
 517 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:213
 520 : CBC_PUSH_NUMBER_POS_BYTE number:219
 522 : CBC_PUSH_NUMBER_POS_BYTE number:55
 524 : CBC_PUSH_NUMBER_POS_BYTE number:69
 526 : CBC_PUSH_NUMBER_POS_BYTE number:222
 528 : CBC_PUSH_NUMBER_POS_BYTE number:253
 530 : CBC_PUSH_NUMBER_POS_BYTE number:142
 532 : CBC_PUSH_NUMBER_POS_BYTE number:47
 534 : CBC_PUSH_NUMBER_POS_BYTE number:3
 536 : CBC_PUSH_NUMBER_POS_BYTE number:255
 538 : CBC_PUSH_NUMBER_POS_BYTE number:106
 540 : CBC_PUSH_NUMBER_POS_BYTE number:114
 542 : CBC_PUSH_NUMBER_POS_BYTE number:109
 544 : CBC_PUSH_NUMBER_POS_BYTE number:108
 546 : CBC_PUSH_NUMBER_POS_BYTE number:91
 548 : CBC_PUSH_NUMBER_POS_BYTE number:81
 550 : CBC_NEW byte_arg:16
 552 : CBC_ASSIGN_BLOCK
 553 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:12
 556 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:141
 559 : CBC_PUSH_NUMBER_POS_BYTE number:27
 561 : CBC_PUSH_NUMBER_POS_BYTE number:175
 563 : CBC_PUSH_NUMBER_POS_BYTE number:146
 565 : CBC_PUSH_NUMBER_POS_BYTE number:187
 567 : CBC_PUSH_NUMBER_POS_BYTE number:221
 569 : CBC_PUSH_NUMBER_POS_BYTE number:188
 571 : CBC_PUSH_NUMBER_POS_BYTE number:127
 573 : CBC_PUSH_NUMBER_POS_BYTE number:17
 575 : CBC_PUSH_NUMBER_POS_BYTE number:217
 577 : CBC_PUSH_NUMBER_POS_BYTE number:92
 579 : CBC_PUSH_NUMBER_POS_BYTE number:65
 581 : CBC_PUSH_NUMBER_POS_BYTE number:31
 583 : CBC_PUSH_NUMBER_POS_BYTE number:16
 585 : CBC_PUSH_NUMBER_POS_BYTE number:90
 587 : CBC_PUSH_NUMBER_POS_BYTE number:216
 589 : CBC_NEW byte_arg:16
 591 : CBC_ASSIGN_BLOCK
 592 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:13
 595 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:10
 598 : CBC_PUSH_NUMBER_POS_BYTE number:193
 600 : CBC_PUSH_NUMBER_POS_BYTE number:49
 602 : CBC_PUSH_NUMBER_POS_BYTE number:136
 604 : CBC_PUSH_NUMBER_POS_BYTE number:165
 606 : CBC_PUSH_NUMBER_POS_BYTE number:205
 608 : CBC_PUSH_NUMBER_POS_BYTE number:123
 610 : CBC_PUSH_NUMBER_POS_BYTE number:189
 612 : CBC_PUSH_NUMBER_POS_BYTE number:45
 614 : CBC_PUSH_NUMBER_POS_BYTE number:116
 616 : CBC_PUSH_NUMBER_POS_BYTE number:208
 618 : CBC_PUSH_NUMBER_POS_BYTE number:18
 620 : CBC_PUSH_NUMBER_POS_BYTE number:184
 622 : CBC_PUSH_NUMBER_POS_BYTE number:229
 624 : CBC_PUSH_NUMBER_POS_BYTE number:180
 626 : CBC_PUSH_NUMBER_POS_BYTE number:176
 628 : CBC_NEW byte_arg:16
 630 : CBC_ASSIGN_BLOCK
 631 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:14
 634 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:137
 637 : CBC_PUSH_NUMBER_POS_BYTE number:105
 639 : CBC_PUSH_NUMBER_POS_BYTE number:151
 641 : CBC_PUSH_NUMBER_POS_BYTE number:74
 643 : CBC_PUSH_NUMBER_POS_BYTE number:12
 645 : CBC_PUSH_NUMBER_POS_BYTE number:150
 647 : CBC_PUSH_NUMBER_POS_BYTE number:119
 649 : CBC_PUSH_NUMBER_POS_BYTE number:126
 651 : CBC_PUSH_NUMBER_POS_BYTE number:101
 653 : CBC_PUSH_NUMBER_POS_BYTE number:185
 655 : CBC_PUSH_NUMBER_POS_BYTE number:241
 657 : CBC_PUSH_NUMBER_POS_BYTE number:9
 659 : CBC_PUSH_NUMBER_POS_BYTE number:197
 661 : CBC_PUSH_NUMBER_POS_BYTE number:110
 663 : CBC_PUSH_NUMBER_POS_BYTE number:198
 665 : CBC_PUSH_NUMBER_POS_BYTE number:132
 667 : CBC_NEW byte_arg:16
 669 : CBC_ASSIGN_BLOCK
 670 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:5-&gt;string(SboxTable) number:15
 673 : CBC_PUSH_LITERAL_PUSH_NUMBER_POS_BYTE ident:23-&gt;string(Array) number:24
 676 : CBC_PUSH_NUMBER_POS_BYTE number:240
 678 : CBC_PUSH_NUMBER_POS_BYTE number:125
 680 : CBC_PUSH_NUMBER_POS_BYTE number:236
 682 : CBC_PUSH_NUMBER_POS_BYTE number:58
 684 : CBC_PUSH_NUMBER_POS_BYTE number:220
 686 : CBC_PUSH_NUMBER_POS_BYTE number:77
 688 : CBC_PUSH_NUMBER_POS_BYTE number:32
 690 : CBC_PUSH_NUMBER_POS_BYTE number:121
 692 : CBC_PUSH_NUMBER_POS_BYTE number:238
 694 : CBC_PUSH_NUMBER_POS_BYTE number:95
 696 : CBC_PUSH_NUMBER_POS_BYTE number:62
 698 : CBC_PUSH_NUMBER_POS_BYTE number:215
 700 : CBC_PUSH_NUMBER_POS_BYTE number:203
 702 : CBC_PUSH_NUMBER_POS_BYTE number:57
 704 : CBC_PUSH_NUMBER_POS_BYTE number:72
 706 : CBC_NEW byte_arg:16
 708 : CBC_ASSIGN_BLOCK
 709 : CBC_PUSH_THREE_LITERALS ident:23-&gt;string(Array) const:30-&gt;number(462357) const:31-&gt;number(472066609)
 713 : CBC_PUSH_THREE_LITERALS const:32-&gt;number(943670861) const:33-&gt;number(1415275113) const:34-&gt;number(1886879365)
 717 : CBC_PUSH_THREE_LITERALS const:35-&gt;number(2358483617) const:36-&gt;number(2830087869) const:37-&gt;number(3301692121)
 721 : CBC_PUSH_THREE_LITERALS const:38-&gt;number(3773296373) const:39-&gt;number(4228057617) const:40-&gt;number(404694573)
 725 : CBC_PUSH_THREE_LITERALS const:41-&gt;number(876298825) const:42-&gt;number(1347903077) const:43-&gt;number(1819507329)
 729 : CBC_PUSH_THREE_LITERALS const:44-&gt;number(2291111581) const:45-&gt;number(2762715833) const:46-&gt;number(3234320085)
 733 : CBC_PUSH_THREE_LITERALS const:47-&gt;number(3705924337) const:48-&gt;number(4177462797) const:49-&gt;number(337322537)
 737 : CBC_PUSH_THREE_LITERALS const:50-&gt;number(808926789) const:51-&gt;number(1280531041) const:52-&gt;number(1752135293)
 741 : CBC_PUSH_THREE_LITERALS const:53-&gt;number(2223739545) const:54-&gt;number(2695343797) const:55-&gt;number(3166948049)
 745 : CBC_PUSH_THREE_LITERALS const:56-&gt;number(3638552301) const:57-&gt;number(4110090761) const:58-&gt;number(269950501)
 749 : CBC_PUSH_THREE_LITERALS const:59-&gt;number(741554753) const:60-&gt;number(1213159005) const:61-&gt;number(1684763257)
 753 : CBC_NEW byte_arg:32
 755 : CBC_ASSIGN_SET_IDENT ident:6-&gt;string(CK)
 757 : CBC_PUSH_THREE_LITERALS ident:23-&gt;string(Array) const:62-&gt;number(2746333894) const:63-&gt;number(1453994832)
 761 : CBC_PUSH_TWO_LITERALS const:64-&gt;number(1736282519) const:65-&gt;number(2993693404)
 764 : CBC_NEW byte_arg:4
 766 : CBC_ASSIGN_SET_IDENT ident:7-&gt;string(FK)
 768 : CBC_PUSH_LITERAL const:66-&gt;string(ctf{this_is_an_example})
 770 : CBC_ASSIGN_SET_IDENT ident:18-&gt;string(input)
 772 : CBC_PUSH_NUMBER_0
 773 : CBC_ASSIGN_SET_IDENT ident:19-&gt;string(num)
 775 : CBC_PUSH_LITERAL ident:23-&gt;string(Array)
 777 : CBC_NEW0
 778 : CBC_ASSIGN_SET_IDENT ident:20-&gt;string(message)
 780 : CBC_PUSH_NUMBER_0
 781 : CBC_MOV_IDENT reg:1
 783 : CBC_JUMP_FORWARD offset:32(-&gt;815)
 785 : CBC_MULTIPLY_TWO_LITERALS ident:19-&gt;string(num) const:67-&gt;number(256)
 788 : CBC_PUSH_PROP_LITERAL_LITERAL_REFERENCE ident:18-&gt;string(input) const:68-&gt;string(charCodeAt)
 791 : CBC_PUSH_LITERAL reg:1
 793 : CBC_CALL1_PROP_PUSH_RESULT
 794 : CBC_ADD
 795 : CBC_ASSIGN_SET_IDENT_BLOCK ident:19-&gt;string(num)
 797 : CBC_MODULO_TWO_LITERALS reg:1 const:69-&gt;number(4)
 800 : CBC_EQUAL_RIGHT_LITERAL const:70-&gt;number(3)
 802 : CBC_BRANCH_IF_FALSE_FORWARD offset:11(-&gt;813)
 804 : CBC_PUSH_PROP_LITERAL_LITERAL_REFERENCE ident:20-&gt;string(message) const:71-&gt;string(push)
 807 : CBC_PUSH_LITERAL ident:19-&gt;string(num)
 809 : CBC_CALL1_PROP_BLOCK
 810 : CBC_PUSH_NUMBER_0
 811 : CBC_ASSIGN_SET_IDENT_BLOCK ident:19-&gt;string(num)
 813 : CBC_PRE_INCR_IDENT reg:1
 815 : CBC_PUSH_TWO_LITERALS reg:1 ident:18-&gt;string(input)
 818 : CBC_PUSH_PROP_LITERAL const:72-&gt;string(length)
 820 : CBC_LESS
 821 : CBC_BRANCH_IF_TRUE_BACKWARD offset:36(-&gt;785)
 823 : CBC_PUSH_PROP_LITERAL_LITERAL_REFERENCE ident:24-&gt;string(Math) const:73-&gt;string(ceil)
 826 : CBC_PUSH_PROP_LITERAL_LITERAL ident:20-&gt;string(message) const:72-&gt;string(length)
 829 : CBC_DIVIDE_RIGHT_LITERAL const:69-&gt;number(4)
 831 : CBC_CALL1_PROP_PUSH_RESULT
 832 : CBC_ASSIGN_SET_IDENT ident:21-&gt;string(count)
 834 : CBC_MULTIPLY_TWO_LITERALS ident:21-&gt;string(count) const:69-&gt;number(4)
 837 : CBC_ASSIGN_SET_IDENT ident:22-&gt;string(pad_len)
 839 : CBC_JUMP_FORWARD offset:7(-&gt;846)
 841 : CBC_PUSH_PROP_LITERAL_LITERAL_REFERENCE ident:20-&gt;string(message) const:71-&gt;string(push)
 844 : CBC_PUSH_NUMBER_0
 845 : CBC_CALL1_PROP_BLOCK
 846 : CBC_PUSH_PROP_LITERAL_LITERAL ident:20-&gt;string(message) const:72-&gt;string(length)
 849 : CBC_LESS_RIGHT_LITERAL ident:22-&gt;string(pad_len)
 851 : CBC_BRANCH_IF_TRUE_BACKWARD offset:10(-&gt;841)
 853 : CBC_PUSH_THREE_LITERALS ident:23-&gt;string(Array) const:74-&gt;number(19088743) const:75-&gt;number(2309737967)
 857 : CBC_PUSH_TWO_LITERALS const:76-&gt;number(4275878552) const:77-&gt;number(1985229328)
 860 : CBC_NEW byte_arg:4
 862 : CBC_ASSIGN_SET_IDENT_BLOCK ident:25-&gt;string(key)
 864 : CBC_PUSH_THREE_LITERALS ident:23-&gt;string(Array) const:78-&gt;number(1605062385) const:79-&gt;number(-642825121)
 868 : CBC_PUSH_THREE_LITERALS const:80-&gt;number(2061445208) const:81-&gt;number(1405610911) const:82-&gt;number(1713399267)
 872 : CBC_PUSH_THREE_LITERALS const:83-&gt;number(1396669315) const:84-&gt;number(1081797168) const:85-&gt;number(605181189)
 876 : CBC_PUSH_THREE_LITERALS const:86-&gt;number(1824766525) const:87-&gt;number(1196148725) const:88-&gt;number(763423307)
 880 : CBC_PUSH_LITERAL const:89-&gt;number(1125925868)
 882 : CBC_NEW byte_arg:12
 884 : CBC_ASSIGN_SET_IDENT_BLOCK ident:26-&gt;string(ans)
 886 : CBC_PUSH_LITERAL ident:23-&gt;string(Array)
 888 : CBC_NEW0
 889 : CBC_ASSIGN_SET_IDENT_BLOCK ident:27-&gt;string(message_c)
 891 : CBC_PUSH_NUMBER_0
 892 : CBC_MOV_IDENT reg:1
 894 : CBC_JUMP_FORWARD offset:47(-&gt;941)
 896 : CBC_PUSH_PROP_LITERAL_LITERAL_REFERENCE ident:20-&gt;string(message) const:90-&gt;string(splice)
 899 : CBC_PUSH_NUMBER_0
 900 : CBC_PUSH_NUMBER_POS_BYTE number:4
 902 : CBC_CALL2_PROP_PUSH_RESULT
 903 : CBC_MOV_IDENT reg:2
 905 : CBC_PUSH_THREE_LITERALS ident:15-&gt;string(encrypt) reg:2 ident:25-&gt;string(key)
 909 : CBC_CALL2_PUSH_RESULT
 910 : CBC_MOV_IDENT reg:3
 912 : CBC_PUSH_NUMBER_0
 913 : CBC_MOV_IDENT reg:4
 915 : CBC_JUMP_FORWARD offset:16(-&gt;931)
 917 : CBC_PUSH_PROP_LITERAL_LITERAL_REFERENCE ident:27-&gt;string(message_c) const:71-&gt;string(push)
 920 : CBC_PUSH_THREE_LITERALS ident:28-&gt;string(parseInt) reg:3 reg:4
 924 : CBC_PUSH_PROP
 925 : CBC_PUSH_NUMBER_POS_BYTE number:16
 927 : CBC_CALL2_PUSH_RESULT
 928 : CBC_CALL1_PROP_BLOCK
 929 : CBC_PRE_INCR_IDENT reg:4
 931 : CBC_PUSH_TWO_LITERALS reg:4 reg:3
 934 : CBC_PUSH_PROP_LITERAL const:72-&gt;string(length)
 936 : CBC_LESS
 937 : CBC_BRANCH_IF_TRUE_BACKWARD offset:20(-&gt;917)
 939 : CBC_PRE_INCR_IDENT reg:1
 941 : CBC_LESS_TWO_LITERALS reg:1 ident:21-&gt;string(count)
 944 : CBC_BRANCH_IF_TRUE_BACKWARD offset:48(-&gt;896)
 946 : CBC_PUSH_LITERAL ident:27-&gt;string(message_c)
 948 : CBC_BRANCH_IF_FALSE_FORWARD offset:10(-&gt;958)
 950 : CBC_PUSH_THREE_LITERALS ident:29-&gt;string(print) ident:17-&gt;string(compare_array) ident:27-&gt;string(message_c)
 954 : CBC_PUSH_LITERAL ident:26-&gt;string(ans)
 956 : CBC_CALL2_PUSH_RESULT
 957 : CBC_CALL1_BLOCK
 958 : CBC_RETURN_FUNCTION_END
</code></pre><div class="notion-text notion-block-bcca078824a340559d1d22806119472b">可以看出是SM4加密</div><div class="notion-text notion-block-6e9ca99d619a4b8b80218eef06c1b9e6">找到key和ans</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-python">key = [19088743,2309737967,4275878552,1985229328]
ans = [1605062385,-642825121,2061445208,1405610911,1713399267,1396669315,1081797168,605181189,1824766525,1196148725,763423307,1125925868]

转成hex
key=&#x27;0x123456789abcdeffedcba9876543210&#x27;
ans=&#x27;0x5fab4ef1d9af445f7adf285853c7eb9f662065e3533f7b83407aea30241255056cc3ba3d474bc7f52d80ea4b431c43ec&#x27;</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-ece31ea604b14210b5bba73eec596551"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fa272b529-92e0-43b4-82a6-89fb8be1a3e7%2Fimage_(40).png?table=block&amp;id=ece31ea6-04b1-4210-b5bb-a73eec596551" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-5e8e2eda08a642ce99cec6ca067fe665">直接使用在线解码，得到flag</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">ctf{w3_f0und_1t_112ug31vjhe121f21fas}</code></pre></main></div>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[第四届杭州师范大学校赛出题人miscwp]]></title>
            <link>https://tangly1024.com/article/6</link>
            <guid>https://tangly1024.com/article/6</guid>
            <pubDate>Wed, 05 Apr 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[感觉出难了呜呜呜]]></description>
            <content:encoded><![CDATA[<div id="container" class="mx-auto undefined"><main class="notion light-mode notion-page notion-block-526dde3e03104f2297a2eec125c4ec96"><div class="notion-viewport"></div><div class="notion-collection-page-properties"></div><blockquote class="notion-quote notion-block-7bdd0f32500e46bc991546c2ab505d4a"><div>把学弟的wp拿来用，自己懒得写了
总的来说出题想法是想让做题人多动动手，主动查查一些资料，不过，最后一败涂地</div></blockquote><h3 class="notion-h notion-h2 notion-h-indent-0 notion-block-5f9d61215fef4d9690dfd5173dd21a6c" data-id="5f9d61215fef4d9690dfd5173dd21a6c"><span><div id="5f9d61215fef4d9690dfd5173dd21a6c" class="notion-header-anchor"></div><a class="notion-hash-link" href="#5f9d61215fef4d9690dfd5173dd21a6c" title="致我那逝去的青春"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">致我那逝去的青春</span></span></h3><div class="notion-text notion-block-e31700fe3bc84424986bbd89533650f4"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://zhuanlan.zhihu.com/p/142113610">参考资料</a></div><blockquote class="notion-quote notion-block-3517f70c61874721bdfe0c886e83ced0"><div>这题是抄的去年NCTF2022的原题，当做签到题，要是没人做出来其他题就把这个放出来</div></blockquote><div class="notion-text notion-block-6bfe486899d3465aba74bd15fa2df606">下面直接放出脚本，注释都在上面了</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-python">import string

# 读取卡组代码
# AAECAZoFKNAFhAeMBtIGngXIBrwFzgnmBpIJpgnSBrYH5gaSCaYJ0ga2B4IGugm2B9AF/gOIBPQIiAnQBb4GiAngA8wI8ge2B+oDvga2B6gFmgjyB+IJAAA=
with open(&#x27;hearthstone.txt&#x27;,&#x27;r&#x27;) as f:
    tes = f.readline()

# 生成base64索引表
box = list(string.ascii_uppercase+string.ascii_lowercase+string.digits+&quot;+/&quot;)

bin_arr = []
# 将代码四四分组
grouped_string = [tes[i:i+4] for i in range(0, len(tes), 4)]
for line in grouped_string:
    # 将每组的每一位转为6位的二进制值
    chres = &#x27;&#x27;
    for i in range(0,4):
        # =用000000填充
        if line[i] == &#x27;=&#x27;:
            chres += &#x27;000000&#x27;
        else:
            chres += format(box.index(line[i]), &quot;06b&quot;)
    # 将4个6位的二进制值转为3个8位的二进制值
    for i in range(0, len(chres), 8):
        # 省略最后一组8位都是0的情况
        if chres[i:i+8] == &#x27;00000000&#x27; and line == grouped_string[-1]:
            continue
        else:
            bin_arr.append(chres[i:i+8])

# 将前面与卡牌内容无关的二进制值去除
bin_arr = bin_arr[7:]
# 以两个为一组，去除一组中第一个值的第一位，去除一组中第二个值中前面无意义的0
for n in range(0,len(bin_arr),2):
    # bin(int(bin_arr[n+1], 2))[2:] 去除无意义的0
    tmp = bin(int(bin_arr[n+1], 2))[2:] + bin_arr[n][1:]
    # 如果其ascii值大于255，则需要除10再转为字符，否则直接转为字符
    if int(tmp,2) &gt; 255:
        print(chr(int(tmp,2)//10),end=&#x27;&#x27;)
    else:
        print(chr(int(tmp,2)),end=&#x27;&#x27;)

# HZNUCTF{WuwU_WuwU_My_H34rtHSt0ne_1S_Die}</code></pre><div class="notion-text notion-block-d32d424dee8145089b5367ab2570f39f"><b>另一种解法</b></div><div class="notion-text notion-block-467198c5e048419d867c9bfa387b7302">python居然有一个库是<code class="notion-inline-code">hearthstone</code>，可以一把梭</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">from hearthstone.deckstrings import Deck

deck = Deck.from_deckstring(&#x27;AAEDAZoFKIwGngXIBrwFzgnQBfIHygf0CIgJkAi+BogJ1gjMCPIHtgeeBeAD6AfyB7YHvgbgA+AD4AO2B7wFkgnMCMwI+ga2B/QImgi6BJAIiAn2BOIJAAA=&#x27;)

for card in deck.cards:
    flag_part = int(card[0] / 10)
    print(chr(flag_part), end=&#x27;&#x27;)</code></pre><h3 class="notion-h notion-h2 notion-h-indent-0 notion-block-a44727cfc2294f7aae2d56891251c4e5" data-id="a44727cfc2294f7aae2d56891251c4e5"><span><div id="a44727cfc2294f7aae2d56891251c4e5" class="notion-header-anchor"></div><a class="notion-hash-link" href="#a44727cfc2294f7aae2d56891251c4e5" title="snake"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">snake</span></span></h3><blockquote class="notion-quote notion-block-98d812af01dd41ef8133331aecd89819"><div>misc选手怎么能不会逆向呢？</div></blockquote><div class="notion-text notion-block-8dd88b082b1b47998657e54442bc5058">下载后是一个python编程的exe文件，先将其反编译，使用<a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://github.com/extremecoders-re/pyinstxtractor"><code class="notion-inline-code">pyinstxtractor</code></a>工具</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">python .\pyinstxtractor.py D:\Security\CTF\杂\HZNUCTF校赛决赛\MISC\snake\snake.exe</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-3d7814dbe35440f4b675dd4a00fe680e"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F981f0fb9-4372-475b-bcb9-9d6b0cacba8c%2Fimage_(41).png?table=block&amp;id=3d7814db-e354-40f4-b675-dd4a00fe680e" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-226c29b1b9e64b44b3a40360e358c3a8">得到的文件夹中有<code class="notion-inline-code">snake.pyc</code>文件，我们再将其反编译为<code class="notion-inline-code">py</code>文件，使用<a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://tool.lu/pyc/">在线网站</a></div><div class="notion-text notion-block-8e0e496b6e0f4b0f81b676a034318812">打开得到的<code class="notion-inline-code">py</code>文件，发现上面有flag的提示</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-e1dac1ee95844d91b5a581b416afd262"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F75cacd22-5500-4a88-956e-a2d001784434%2Fimage_(66).png?table=block&amp;id=e1dac1ee-9584-4d91-b5a5-81b416afd262" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-4e7a1bc3f8544afc8ed186871ced3f92">将其格式转换一下</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">s = b&quot;import hashlib \nimport string \nsalt_1 = &#x27;xxxxxxxxxxx&#x27; \nsalt_2 = &#x27;xxxxxxxxxxx&#x27; \nsalt_3 = &#x27;xxxxxxxxxxx&#x27; \nsalt = salt_1 + salt_2 + salt_3 \ndata = &#x27;HZNUCTF{xxxxx}&#x27;  #5%e4%bd%8d ascii+digits+_ \nsalt_data = salt + data \ndata_sha = hashlib.sha256(salt_data.encode(&#x27;utf-8&#x27;)).hexdigest() \nprint(data_sha)  #c08521f3c380906d05ee8afbc7fa2943afb3788d9cec94c1b86771ee35ca4738&quot;
print(s.decode())</code></pre><div class="notion-text notion-block-5abd1fa65fd049f6829266567ef56786">得到</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">import hashlib
import string
salt_1 = &#x27;xxxxxxxxxxx&#x27;
salt_2 = &#x27;xxxxxxxxxxx&#x27;
salt_3 = &#x27;xxxxxxxxxxx&#x27;
salt = salt_1 + salt_2 + salt_3
data = &#x27;HZNUCTF{xxxxx}&#x27;  #5%e4%bd%8d ascii+digits+_
salt_data = salt + data
data_sha = hashlib.sha256(salt_data.encode(&#x27;utf-8&#x27;)).hexdigest()
print(data_sha)  #c08521f3c380906d05ee8afbc7fa2943afb3788d9cec94c1b86771ee35ca4738</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-885252d448ff45ba8b9b99c1a1e0facb"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F36651717-c9ae-4934-96aa-12a2be4d7afc%2Fimage_(42).png?table=block&amp;id=885252d4-48ff-45ba-8b9b-99c1a1e0facb" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-a4706050a7914819983035cfc9aad06e">这里salt值还不知道，再去文件中找一下</div><div class="notion-text notion-block-26375dc4140c43e985e602a00e4f0608">发现salt_1和salt_2都是已知的，salt_3需要逆运算一下</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">print(&#x27;&#x27;.join([chr(ord(c)-i) for i, c in enumerate(&#x27;mhigexn|irlt&#x27;)]))
# mggdashuaibi</code></pre><div class="notion-text notion-block-b67fa7207fc34b6a84a1b53482c87a4a">得到三个salt后再看代码，就是一个哈希爆破，一共有5位需要爆破，这里直接给出爆破脚本</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">import hashlib
import string
salt_1 = &#x27;mxx307shuai&#x27;
salt_2 = &#x27;mxx407shuai&#x27;
salt_3 = &#x27;mggdashuaibi&#x27;
salt = salt_1 + salt_2 + salt_3
box = list(string.ascii_letters+string.digits+&quot;_&quot;)
for a in box:
    for b in box:
        for c in box:
            for d in box:
                for e in box:
                    data = &quot;HZNUCTF{&quot;+a+b+c+d+e+&quot;}&quot;
                    salt_data = salt + data
                    data_sha = hashlib.sha256(salt_data.encode(&#x27;utf-8&#x27;)).hexdigest()
                    if data_sha == &#x27;c08521f3c380906d05ee8afbc7fa2943afb3788d9cec94c1b86771ee35ca4738&#x27;:
                        print(data)
                        exit(0)</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-1e0bee34edb54258832072473e4f10c4"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F0f874a23-7a2f-443b-b49f-1cc33e339672%2Fimage_(43).png?table=block&amp;id=1e0bee34-edb5-4258-8320-72473e4f10c4" alt="notion image" loading="lazy" decoding="async"/></div></figure><h3 class="notion-h notion-h2 notion-h-indent-0 notion-block-3f1cdf3d871f45e0ab25b8edd0f996f9" data-id="3f1cdf3d871f45e0ab25b8edd0f996f9"><span><div id="3f1cdf3d871f45e0ab25b8edd0f996f9" class="notion-header-anchor"></div><a class="notion-hash-link" href="#3f1cdf3d871f45e0ab25b8edd0f996f9" title="babyLSB"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">babyLSB</span></span></h3><blockquote class="notion-quote notion-block-438c0079cf394479a2a739ca537a269c"><div>一个小小魔改的LSB</div></blockquote><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">hint：

写脚本，两个像素点一组，注意文件名</code></pre><div class="notion-text notion-block-ec1f8f53c3cc4ed09a007394067bd254">解压得到<code class="notion-inline-code">R0G2R1G2A2B3.png</code>，这里根据提示的两个像素点为一组，可以猜测文件名中的<code class="notion-inline-code">R0G2R1</code>对应第一个像素点，<code class="notion-inline-code">G2A2B3</code>对应第二个像素点，而其中的字母表示通道，数字代表8位二进制的哪一位是插入点</div><div class="notion-text notion-block-a7cacead17dc4e2cac57cb26e6c9e7e7">因此这里编写解密脚本</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">import numpy as np
from PIL import Image

# 读取png图片
img = Image.open(&quot;R0G2R1G2A2B3.png&quot;)

# 获取图像尺寸
width, height = img.size

# 将图像转换为NumPy数组
img_arr = np.array(img)

res = &#x27;&#x27;
# 创建一个文本文件并写入RGBA通道值
for i in range(height):
    for j in range(0,width,2):
        # 两个为一组
        rgb_1 = img_arr[i, j, :]
        rgb_2 = img_arr[i, j+1, :]
        # 根据文件名 R0G2R1G2A2B3 ，R0G2R1 是第一个的值，表示r通道的0位，g通道的2位，r通道的1位；G2A2B3 是第二个的值，表示g通道的2位，alpha通道的2位，b通道的3位
        res += format(rgb_1[0],&#x27;08b&#x27;)[-1] + format(rgb_1[1],&#x27;08b&#x27;)[-3] + format(rgb_1[0],&#x27;08b&#x27;)[-2] + format(rgb_2[1],&#x27;08b&#x27;)[-3] + format(rgb_2[3],&#x27;08b&#x27;)[-3] + format(rgb_2[2],&#x27;08b&#x27;)[-4]

#print(res)
# 通过二进制转十六进制发现504b开头，猜测为zip文件，因此将二进制转为zip文件
int_list = [int(res[i:i+8],2) for i in range(0,len(res),8)]
bytes_data = bytes(int_list)
with open(&quot;output.zip&quot;, &quot;wb&quot;) as f:
    f.write(bytes_data)</code></pre><div class="notion-text notion-block-557edd12481241009fbb0dce58125d2c">得到output.zip，解压后得到FLAG.txt，其中就是flag</div><h3 class="notion-h notion-h2 notion-h-indent-0 notion-block-229f6f018b92461d944c8de21fc122e7" data-id="229f6f018b92461d944c8de21fc122e7"><span><div id="229f6f018b92461d944c8de21fc122e7" class="notion-header-anchor"></div><a class="notion-hash-link" href="#229f6f018b92461d944c8de21fc122e7" title="蹦蹦炸弹"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">蹦蹦炸弹</span></span></h3><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">题目描述：

解压密码：5ff0762eeabcd275c75c4b6e943097c518604493323a52488e67a5d595d108ce79c6d1539a3740f026c4d10d55085c9ec6b0b52a9b5892e1fbd85b671ed16d7a
大坏蛋mxx307入侵了我的系统，最后还想ssh将我的PPT偷走，不过聪明的可莉可是加密了PPT，诶，我忘记我的PPT的密码是啥了，好像是5位小写字母呢。
ssh为弱密码
flag有三部分，第一部分为用户密码

hint：
1. Linux取证
2. Ubuntu符号表(附件)</code></pre><div class="notion-text notion-block-5b282a2e77f141b78121a9b42ae6b845">解压是一个<code class="notion-inline-code">dmp</code>后缀的内存文件，直接用<code class="notion-inline-code">vol2</code>跑会卡住，应该是没有对应镜像的内核</div><div class="notion-text notion-block-8d1c6b68144c4c7a90e34e11967eb43c">用<code class="notion-inline-code">vol3</code>看一下文件的版本号</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">python vol.py -f /root/temp/flag.dmp banners</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-74c0101e3b8c48e8b02dd574dab908d1"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fc1b73ed1-d51c-4184-b162-adec09e838ad%2Fimage_(44).png?table=block&amp;id=74c0101e-3b8c-48e8-b02d-d574dab908d1" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-d2d50fa88d6847e1ad1e814b45febf39">得到结果</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">Linux version 4.15.0-20-generic (buildd@lgw01-amd64-039) (gcc version 7.3.0 (Ubuntu 7.3.0-16ubuntu3))
#21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 (Ubuntu 4.15.0-20.21-generic 4.15.17)</code></pre><div class="notion-text notion-block-752166d4c603410da0c3301466c74355">题目中是直接提供符号表的，我也不想去自己去搞了，放一篇<a class="notion-link" href="/526dde3e03104f2297a2eec125c4ec96">文章</a>可以参考一下</div><div class="notion-text notion-block-3166188a2aac4d5cb4e64db077989eda">(看我的<a class="notion-link" href="/efe355f0dba343a3b4ea40997ad51f3c">祥云杯</a>捏)</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-96423a445de449008b0768cc9872fe19"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F367d4bb9-7458-4efa-9ebf-975d6bab2574%2Fimage_(45).png?table=block&amp;id=96423a44-5de4-4900-8b07-68cc9872fe19" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-0793fd1028b64554b1f3e6a9e1745b94">将下载的<code class="notion-inline-code">Ubuntu.zip</code>放在kali的volatility的<code class="notion-inline-code">/volatility/plugins/overlays/linux/</code>目录下</div><div class="notion-text notion-block-f8b22265839840db9334e87ea91a1c6c">切换到<code class="notion-inline-code">vol2</code>，通过以下命令查看是否成功载入</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">python2 vol.py --info | grep Ubuntu</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-25fd1ecc23524870b16936c11e9e8b75"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F6c940f95-759b-436b-90c3-3984366d038e%2Fimage_(46).png?table=block&amp;id=25fd1ecc-2352-4870-b169-36c11e9e8b75" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-0e8e2084a33346b0af94e41b6938f816">然后就可以开始使用<code class="notion-inline-code">vol2</code>做题了，以下链接中有<code class="notion-inline-code">vol2</code>常用<a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://blog.csdn.net/weixin_30538029/article/details/98886434">linux取证命令的解释</a></div><h4 class="notion-h notion-h3 notion-h-indent-1 notion-block-a6cbb6cd01bb4dcbaf02a9b21c34186a" data-id="a6cbb6cd01bb4dcbaf02a9b21c34186a"><span><div id="a6cbb6cd01bb4dcbaf02a9b21c34186a" class="notion-header-anchor"></div><a class="notion-hash-link" href="#a6cbb6cd01bb4dcbaf02a9b21c34186a" title="part1"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">part1</span></span></h4><div class="notion-text notion-block-922730ea6c244e2a87fbc8c094282af7">根据题目描述中，第一部分为<code class="notion-inline-code">用户密码</code>，一般用户密码存放在<code class="notion-inline-code">/etc/shadow</code>中，通过以下命令找到该文件的地址</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">python2 vol.py -f /root/temp/flag.dmp --profile=LinuxUbuntux64 linux_enumerate_files | grep &#x27;shadow&#x27;</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-0054e011a32f426e870e576a5d4742a9"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F4c90617f-7097-4237-b58b-95b26d27f5ef%2Fimage_(47).png?table=block&amp;id=0054e011-a32f-426e-870e-576a5d4742a9" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-b04e96f7f7434223947cf808b3b02c89">找到地址后，通过以下命令将文件提取出来</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">python2 vol.py -f /root/temp/flag.dmp --profile=LinuxUbuntux64 linux_find_file -i 0xffff8b7ad779f3a8 -O shadow</code></pre><div class="notion-text notion-block-24d6fe99e74c4eb2b4c3ca888a7b47fd">打印提取出来的文件shadow，下面flag处是一个<code class="notion-inline-code">sha512crypt $6$, SHA512 (Unix)</code>加密的哈希值</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-4e2e473a887442468031519aaea13331"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fbc8ca21f-9b81-4b56-8c0d-eb08436f9c05%2Fimage_(48).png?table=block&amp;id=4e2e473a-8874-4246-8031-519aaea13331" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-dd20391d6e4d419aa4d7febc5995099c">如何判断该类型哈希值呢？这里是通过hashcat攻击模式索引网站找到的</div><div class="notion-text notion-block-4f1e629b46104057a6ef412dbd49dece"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://hashcat.net/wiki/doku.php?id=example_hashes">https://hashcat.net/wiki/doku.php?id=example_hashes</a></div><div class="notion-text notion-block-195a0e2298b54fb2a8089abbb9db726f">复制哈希值的特征<code class="notion-inline-code">$6$</code>，去网页中<code class="notion-inline-code">ctrl+f</code>搜索即可找到</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-1ebca4e458f74c2dbdbc592d0e9372a3"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F4cf6137e-8388-4267-a73f-4a98f1a7d102%2Fimage_(49).png?table=block&amp;id=1ebca4e4-58f7-4c2d-bdbc-592d0e9372a3" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-91eea10308cd46f4911a3c85969d7ff4">找到对应的攻击值<code class="notion-inline-code">1800</code>，我们采用hashcat来攻击（一般来说短时间的题目爆破结果都不会很复杂，这里直接使用kali自带的<code class="notion-inline-code">rockyou.txt</code>字典爆破比较快）</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">hashcat -m 1800 -a 0 /root/temp/burte.txt /usr/share/wordlists/rockyou.txt</code></pre><div class="notion-text notion-block-e45ada0e84b64654abc3c6d2eb93374d">得到第一部分flag：<code class="notion-inline-code">admin</code></div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-8eca7c9b83954ae9a0f6a87465f42c55"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F5cc24e76-6fcf-4120-959d-fb6efcf73252%2Fimage_(50).png?table=block&amp;id=8eca7c9b-8395-4ae9-a0f6-a87465f42c55" alt="notion image" loading="lazy" decoding="async"/></div></figure><h4 class="notion-h notion-h3 notion-h-indent-1 notion-block-9d4a67af1ca34d2aacd4ef3cb2cf3270" data-id="9d4a67af1ca34d2aacd4ef3cb2cf3270"><span><div id="9d4a67af1ca34d2aacd4ef3cb2cf3270" class="notion-header-anchor"></div><a class="notion-hash-link" href="#9d4a67af1ca34d2aacd4ef3cb2cf3270" title="part2"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">part2</span></span></h4><div class="notion-text notion-block-3ab29f2613ac4f7695f5832318157c60">然后我们再通过以下命令，查看linux内存文件的<code class="notion-inline-code">bash</code>记录（类似于windows取证的cmd命令行，都是需要关注的敏感部分）</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">python2 vol.py -f /root/temp/flag.dmp --profile=LinuxUbuntux64 linux_bash</code></pre><div class="notion-text notion-block-de7808040ee94f4dbdbc65c09e612153">在bash记录中我们能找到一个连接ssh的记录</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-c54d6b1a11d142f4a3d09e58f1f49d55"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fc971e31e-2236-4a2c-9a5e-179b8699fb3e%2Fimage_(51).png?table=block&amp;id=c54d6b1a-11d1-42f4-a3d0-9e58f1f49d55" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-2359dff07dfb40dc87a819c1f5465700">结合题目描述中的<code class="notion-inline-code">ssh为弱密码</code>，尝试去爆破登陆，这里使用<code class="notion-inline-code">metasploit</code>中的ssh爆破模块来爆破（这个工具一般来说，kali自带的）</div><blockquote class="notion-quote notion-block-99bc88c1651f444c8a7251ac8d72554f"><div>在比赛前给toto做了一遍，然后他说123456是可以找到的，我忘记了，那就找找呗</div></blockquote><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text"># 启动msfconsole
msfconsole

# 查找爆破ssh登陆模块
search ssh_login

# 利用模块
use auxiliary/scanner/ssh/ssh_login

# 这里设置中ip，用户名，爆破密码字典是必须设置的
# 设置目标主机ip
set RHOSTS 1.14.49.218

# 设置登陆用户名
set USERNAME ctfer

# 设置密码爆破字典（因为是弱口令，还是用rockyou字典）
set PASS_FILE /usr/share/wordlists/rockyou.txt

# 设置线程
set THREADS 50

# 设置找到密码即停止
set STOP_ON_SUCCESS true</code></pre><div class="notion-text notion-block-62b5d5cdb26f44c895efde470d6f6c21">最后通过<code class="notion-inline-code">show options</code>查看模块设置</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-153ad515e99e47ae9a8098e509ecc790"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F1fd78d6f-1b5f-469d-a72d-068d95d305dd%2Fimage_(52).png?table=block&amp;id=153ad515-e99e-47ae-9a80-98e509ecc790" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-6eb642c666464f00968dc807987ea5b5">再输入<code class="notion-inline-code">run</code>开启爆破，最后找到结果为<code class="notion-inline-code">123456</code></div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-98038b3c4b6c4d529214fa6533dd028c"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F46bcd24e-9f04-414c-adf5-a527de9ef4b8%2Fimage_(53).png?table=block&amp;id=98038b3c-4b6c-4d52-9214-fa6533dd028c" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-c47ad2e593624e99a4a450db51d6b590">然后获得第二部分flag有两种方式</div><div class="notion-text notion-block-094fe7f149524bb885cbb60ff40ed3ec"><b>方式一（非预期）</b></div><div class="notion-text notion-block-14f535761272477c933780261f272c84">使用ssh直连bash</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">ssh -p 22 ctfer@1.14.49.218
# 输入密码123456（这里是无回显的）</code></pre><div class="notion-text notion-block-2127be27982148ce9170cb93b8ba8a29">进去后发现很多命令都不能使用了，只有<code class="notion-inline-code">ls</code>可以使用，通过<code class="notion-inline-code">ls /</code>可以看到根目录下有一个<code class="notion-inline-code">part2</code>的文件</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-53628674272645eab61a0381cff17697"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F663437cb-8714-4d2d-a498-0bf75d144de0%2Fimage_(54).png?table=block&amp;id=53628674-2726-45ea-b61a-0381cff17697" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-fef48ac2a63048a99e22c50c90792d8b">然后我问了mgg后才知道，是被删命令了，但是bash有两个自带命令是删不掉的，一个是<code class="notion-inline-code">for</code>，一个是<code class="notion-inline-code">echo</code>（这边不是删命令，也差不多，只给了ls的使用权限）</div><div class="notion-text notion-block-3fae5be5c5ae4e5d9fd0fc4fa3ba02dd">这里通过<code class="notion-inline-code">echo $(&lt;/part2)</code>可以读取到<code class="notion-inline-code">part2</code>的内容</div><figure class="notion-asset-wrapper notion-asset-wrapper-embed notion-block-ef001be5ef814889bcc5a42628970479"></figure><div class="notion-text notion-block-ab5d0353d2d4474d915b198fcc8d9a54">通过提示<code class="notion-inline-code">$FLAG</code>，我们再去通过<code class="notion-inline-code">echo $FLAG</code>读取环境变量的内容，得到第二部分的flag：<code class="notion-inline-code">_L1nux_f0r3nsics_is_34sy_4nd_</code></div><blockquote class="notion-quote notion-block-f81c1a7b15bb4db88e494f470adf9897"><div>这边听zysgmzb说，跟picoctf2023撞思路了</div></blockquote><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-995539a6bc5c480e83e4a78aabf9fe89"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F7a992aa1-c651-4936-a26f-06541a2cf2f4%2Fimage_(56).png?table=block&amp;id=995539a6-bc5c-480e-83e4-a78aabf9fe89" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-681f020370374bf6837f32981be69d10"><b>方式二</b></div><div class="notion-text notion-block-2932b7bd89034cf89209d0797897b46d">通过<code class="notion-inline-code">xftp</code>连接ssh，可以直接<code class="notion-inline-code">跨越目录</code>去读取<code class="notion-inline-code">part2</code>文件</div><div class="notion-text notion-block-c61b648b002347ed82ebe380e6d4c64d">使用<code class="notion-inline-code">xftp</code>连接后，到达根目录，右键用记事本打开即可得知flag在环境变量中，然后再使用<code class="notion-inline-code">echo $FLAG</code>去打印flag（预期解是一样的，找环境变量那个文件，然后右键打开编辑就读取就好了）</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-d8368660c1be4b73bea1f2bdddba785a"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fde3b44de-3a1b-4497-ba7d-a678f9d889a5%2Fimage_(57).png?table=block&amp;id=d8368660-c1be-4b73-bea1-f2bdddba785a" alt="notion image" loading="lazy" decoding="async"/></div></figure><h4 class="notion-h notion-h3 notion-h-indent-1 notion-block-353245229eb647d09a75b4c3655814eb" data-id="353245229eb647d09a75b4c3655814eb"><span><div id="353245229eb647d09a75b4c3655814eb" class="notion-header-anchor"></div><a class="notion-hash-link" href="#353245229eb647d09a75b4c3655814eb" title="part3（明文攻击可能是以后常考的一个考点了，freebuf那篇文章yyds）"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">part3（明文攻击可能是以后常考的一个考点了，freebuf那篇文章yyds）</span></span></h4><div class="notion-text notion-block-1c72cadbc27e43ca8fa4dc5661fd58bb">我们通过查找桌面上的文件，找到存在一个<code class="notion-inline-code">flag.zip</code></div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">python2 vol.py -f /root/temp/flag.dmp --profile=LinuxUbuntux64 linux_enumerate_files | grep &#x27;Desktop&#x27;</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-b36348dff16a454589ad3d31180909a7"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fe80479d9-296f-4fc8-a87e-8b2d85b49eb9%2Fimage_(58).png?table=block&amp;id=b36348df-f16a-4545-89ad-3d31180909a7" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-1471465c2ef94ab19d9cddc83df81b44">还是将其提取出来先</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">python2 vol.py -f /root/temp/flag.dmp --profile=LinuxUbuntux64 linux_find_file -i 0xffff8b7b753b5e68 -O flag.zip</code></pre><div class="notion-text notion-block-c3a22d0583ac4eb1a8f7a849495a607a">提取出来的<code class="notion-inline-code">flag.zip</code>发现其中两个文件都被加密了，但是使用<code class="notion-inline-code">7-zip</code>打开，发现他们的加密算法都是<code class="notion-inline-code">ZipCrypto</code>，这里可以尝试<code class="notion-inline-code">明文爆破</code></div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">zip明文攻击条件：

1. 至少已知明文的12个字节及偏移，其中至少8字节需要连续。
2. 明文对应的文件加密方式为ZipCrypto Store

知识扩展：

ZIP的加密算法大致分为两种ZipCrypto和AES-256,各自又分Deflate和Store。
- ZipCrypto Deflate
- ZipCrypto Store
- AES-256 Deflate
- AES-256 Store

只有使用ZipCrypto Deflate /Store才可以使用 ZIP已知明文攻击进行破解。</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-42a238851d274ef3bf28ebb8bc94479e"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F601738d0-1d02-460c-95d4-998e46510296%2Fimage_(59).png?table=block&amp;id=42a23885-1d27-4ef3-bf28-ebb8bc94479e" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-dadd6ce4811a47cbbd20ba535e25f30a">先创建已知明文<code class="notion-inline-code">hznuctf.pptx</code></div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">echo -n &quot;hznuctf.pptx&quot; &gt; ~/temp/flag.txt</code></pre><div class="notion-text notion-block-3d1db2da4aff483c86d5c4cbfd8af0a9">进行明文攻击</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">./bkcrack -C ~/temp/flag.zip -c hznuctf.zip -p ~/temp/flag.txt -o 30 -x 0 504B0304</code></pre><ul class="notion-list notion-list-disc notion-block-f39474893cc94c489639abba1ddd2cee"><li>c 提取的密文部分<!-- -->p 提取的明文部分<!-- -->x 压缩包内目标文件的偏移地址 部分已知明文值<!-- -->C 加密压缩包<!-- -->o offset -p参数指定的明文在压缩包内目标文件的偏移量</li></ul><div class="notion-text notion-block-c34946fab35647e2bea6ec6ea94b996b">得到密钥为<code class="notion-inline-code">9f08aab0 c1cab858 f800fdf2</code></div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-25cf00c78b8f41758bf2ae7f0a51571a"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Ffbb9a0cb-51a9-47f1-9045-e88d7c1620cc%2Fimage_(60).png?table=block&amp;id=25cf00c7-8b8f-4175-8bf2-ae7f0a51571a" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-c782f282f1f84e9b94a690fc9b474e21">通过密钥提取文件</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">./bkcrack -C ~/temp/flag.zip -c hznuctf.zip -k 9f08aab0 c1cab858 f800fdf2 -d ~/temp/hznuctf.zip</code></pre><ul class="notion-list notion-list-disc notion-block-2a5b9d1a441d4a82893249096e682033"><li>k 压缩包的密钥</li></ul><ul class="notion-list notion-list-disc notion-block-5bf9fcc1b88042219d42ded51829845b"><li>d 提取文件的名称</li></ul><div class="notion-text notion-block-ca35d25bb47d4337a98f1bf5790263f5">提取出来的文件其中是一个加密的<code class="notion-inline-code">pptx</code>文件，我们继续使用hashcat去爆破其密码</div><div class="notion-text notion-block-4621f36617064b8cb771e849a7932e38">先要提取<code class="notion-inline-code">hznuctf.pptx</code>的哈希值</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">office2john hznuctf.pptx &gt;&gt; office.txt</code></pre><div class="notion-text notion-block-7a38e6988175407ba4917a026564bac9">得到的office.txt中需要将其中的<code class="notion-inline-code">hznuctf.pptx:</code>删掉</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-278ce2204a154465bb537e0d49ff2431"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F2c89eb23-feaf-496e-a541-3156017163b0%2Fimage_(61).png?table=block&amp;id=278ce220-4a15-4465-bb53-7e0d49ff2431" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-71035d5246b44507a4176268462a2ef9">然后找到其在hashcat中哈希对应的值<code class="notion-inline-code">9600</code></div><div class="notion-text notion-block-13377246364543b3ae5a60db135f713c">这里wp中采用的是掩码爆破，因为在题目描述中提示了<code class="notion-inline-code">5位小写字母</code>，但是我爆破半天没出来，后来发现其密码也是<code class="notion-inline-code">弱口令</code>，通过<code class="notion-inline-code">rockyou</code>字典可以找到</div><div class="notion-text notion-block-a6b33f296559421b8dcc7942d70eac5e"><b>掩码爆破</b></div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">hashcat -m 9600 -a 3 /root/temp/office.txt ?l?l?l?l?l --self-test-disable</code></pre><div class="notion-text notion-block-fb050fd5cb1c40aa802357c67f904575"><b>字典爆破</b></div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">hashcat -m 9600 -a 0 ~/temp/office.txt /usr/share/wordlists/rockyou.txt</code></pre><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-e5368ac42a044cac8f00322e00e1e6e3"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F8b1fd314-5fe9-4178-9b6a-3d99b62ed0d2%2Fimage_(62).png?table=block&amp;id=e5368ac4-2a04-4cac-8f00-322e00e1e6e3" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-5099c2bb7dc94247ad240b0d01c4b19a">得到密码为：<code class="notion-inline-code">fools</code></div><div class="notion-text notion-block-c91e68c5140440329eb5edb198439ac0">使用密码能打开pptx文件，flag有点难找，mgg给了一个trick，通过<code class="notion-inline-code">文件-信息-检查问题-检查文档</code>可以发现pptx的注释中存在额外内容</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-05366545859146b898cdc3c5a9919700"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fbc4f1589-ab9c-4db5-b8ca-5fabd85e4eba%2Fimage_(63).png?table=block&amp;id=05366545-8591-46b8-98cd-c3c5a9919700" alt="notion image" loading="lazy" decoding="async"/></div></figure><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-b733d3b8aa134b9091c085bff272a592"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Faa2f4908-285a-47f4-b9d6-4ac421509dca%2Fimage_(64).png?table=block&amp;id=b733d3b8-aa13-4b90-91c0-85bff272a592" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-e6a5cb5697e84cc9863817d985c27f0a">最后在第一张ppt的注释中找到最后一部分flag：<code class="notion-inline-code">w3_n33d_bl4sting</code></div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-465bbe4abab14110a47736bd22320a3b"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fab3a19dc-0973-4672-bf57-10f4732faac4%2Fimage_(65).png?table=block&amp;id=465bbe4a-bab1-4110-a477-36bd22320a3b" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-eed26f416cf14ca28f9388ffc5922e06">最后完整的flag为</div><div class="notion-text notion-block-76820580302c4681b3bb575866cdb7c1">HZNUCTF{admin_L1nux_f0r3nsics_is_34sy_4nd_w3_n33d_bl4sting}</div><div class="notion-text notion-block-c708acaa7cb844d0a98aef0846be2a54"><b>参考文章</b></div><div class="notion-text notion-block-a5c6159c589047288b750fad7004af4d"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://byxs20.github.io/posts/41220.html#7-F-LINUX">https://byxs20.github.io/posts/41220.html#7-F-LINUX</a></div><div class="notion-text notion-block-27c3bcfab47943eebf6ea6257f100e4b"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://blog.csdn.net/weixin_46081055/article/details/121897319">https://blog.csdn.net/weixin_46081055/article/details/121897319</a></div><div class="notion-text notion-block-99faa27f05b84a0fb32038f8c7bf7b5f"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://zhuanlan.zhihu.com/p/375352843">https://zhuanlan.zhihu.com/p/375352843</a></div><div class="notion-text notion-block-8ce12b4575904516bf4b8b08ccf04ee2"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://blog.csdn.net/weixin_39934520/article/details/108042194">https://blog.csdn.net/weixin_39934520/article/details/108042194</a></div><div class="notion-text notion-block-de8703f44eb5417bbb451898c3782637"><a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://blog.csdn.net/weixin_30538029/article/details/98886434">https://blog.csdn.net/weixin_30538029/article/details/98886434</a></div></main></div>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Linux内存取证出题记录]]></title>
            <link>https://tangly1024.com/article/5</link>
            <guid>https://tangly1024.com/article/5</guid>
            <pubDate>Wed, 05 Apr 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[校赛出题记录]]></description>
            <content:encoded><![CDATA[<div id="container" class="mx-auto undefined"><main class="notion light-mode notion-page notion-block-e3ca82212dcc45bca073db19cd5832a0"><div class="notion-viewport"></div><div class="notion-collection-page-properties"></div><blockquote class="notion-quote notion-block-6ac39cfce6864df0b2b9cf95bb3e3b06"><div>为了准备校赛，准备了一个内存取证的题目，既然是校赛的，肯定不能搞简单的win7了，试了下win10，如果要原汁取证好像没什么能搞的（指不上那些cs马之类的，cmd好像也读不到，搞了也麻烦，这种不如拿去投题），就简单尝试linux。就简单记录一下。</div></blockquote><h2 class="notion-h notion-h1 notion-h-indent-0 notion-block-a7f3fd13adcd44189a575f77a84cf696" data-id="a7f3fd13adcd44189a575f77a84cf696"><span><div id="a7f3fd13adcd44189a575f77a84cf696" class="notion-header-anchor"></div><a class="notion-hash-link" href="#a7f3fd13adcd44189a575f77a84cf696" title="1、确定版本"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">1、确定版本</span></span></h2><div class="notion-text notion-block-fd3c3a7911844afcbb9ff5ab02d4f9f9">先后尝试了22.04,20.04的ubuntu，他们的版本好像太高了，测了几种之后，好像是5.14版本以上的内核，vol2就分析不出来了，得用vol3才行，嫌麻烦就不用了，最后敲定了18.0.4.4版本的ubuntu，内核版本是</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">Linux version 4.15.0-20-generic (buildd@lgw01-amd64-039) (gcc version 7.3.0 (Ubuntu 7.3.0-16ubuntu3)) 
#21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 (Ubuntu 4.15.0-20.21-generic 4.15.17)</code></pre><div class="notion-text notion-block-07797686ca26487b86fb81f50d297d7c">这边可以直接用下镜像，然后装vol2，make的方法搞内核，也可以用apt的方法搞，这边就不再赘述，具体<a class="notion-link" href="/efe355f0dba343a3b4ea40997ad51f3c">祥云杯的那篇wp</a>，贴一下vol3方法截图吧，是<a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://byxs20.github.io/posts/41220.html#7-F-LINUX">别的师傅</a>那里的</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-dbdaac075baf4e068766c60bf0b7d29e"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F2a2497d8-be7d-4a8b-828b-ad2144320e45%2FUntitled.png?table=block&amp;id=dbdaac07-5baf-4e06-8766-c60bf0b7d29e" alt="notion image" loading="lazy" decoding="async"/></div></figure><h2 class="notion-h notion-h1 notion-h-indent-0 notion-block-27e7065b659f4d1782c9a086c158f606" data-id="27e7065b659f4d1782c9a086c158f606"><span><div id="27e7065b659f4d1782c9a086c158f606" class="notion-header-anchor"></div><a class="notion-hash-link" href="#27e7065b659f4d1782c9a086c158f606" title="2、开始出题"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">2、开始出题</span></span></h2><div class="notion-text notion-block-ebe1dc13428c48f9a8cede671568aa21">首先需要了解什么是内存镜像</div><blockquote class="notion-quote notion-block-8880ecbf72cf4cc6b965662f214e3827"><div>内存为易失性储存设备，电子设备在断电后的短时间内，内存中就会丢失数据，从而失去分析价值；但是随着技术的进步，只要在设备断电后快速将内存卸下，并接入专用设备，也可以从残留的数据中提取证据。更何况大部分情况下，取证人员可以直接在现场，保持设备通电开机的情况下，直接对目标设备的内存进行取证工作，从而给完整提取目标设备的内存数据提供了机会。                                             不同于直接对硬盘、手机、储存卡等设备进行取证，内存取证由于其为设备的内存数据，其天生就为电子取证的重要一点：因为设备在运行中，凡是涉及到数据的解析，在内存中大多都是以中间态或最后的明文态而存在；而在硬盘等设备中，数据可以进行加密，进行混淆，就大大增加了分析难度。故在电子取证中，内存取证往往为最为重要的一环。                                               对于比赛中所接触到的内存取证，选手大多拿到的都是已经提取好的内存镜像文件，也就是内存数据的原始完整拷贝，这已经从开局就大大简化了内存取证的难度。而选手接下来所要面对的，就是对内存数据进行解析。对于内存数据，最为常用的工具便是 <code class="notion-inline-code">Volatility Framework</code> ，其为 <code class="notion-inline-code">Volatility Foundation</code> 所开发的一款对内存取证分析提供支持的框架，对多平台电子设备的内存数据均提供了支持，并且也支持加载第三方模块来增加功能</div></blockquote><div class="notion-text notion-block-e6695cce1e204bd7b0f2495d3544ce19">就跟普通的出题，往里面丢就好，不过会碰到一个小问题，就是碰到大文件，可能会dmp不下来，可以在里面装一个010editor，然后打开，稍微编辑保存改回来就可以，然后就可以dump下来了。因为内存取证，终归还是残留数据。</div><div class="notion-text notion-block-51f27aba6a6846b699ae58faf62a5ddb">然后就用avml dump就行</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-bash">./avml xxx.dmp</code></pre><div class="notion-text notion-block-4b53a3e04d704d7ca1be9c61ef45a3e5">出题其实很简单，主要是做题比较难。</div></main></div>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Windows7内存取证出题记录]]></title>
            <link>https://tangly1024.com/article/3</link>
            <guid>https://tangly1024.com/article/3</guid>
            <pubDate>Mon, 07 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[isctf出题记录]]></description>
            <content:encoded><![CDATA[<div id="container" class="mx-auto undefined"><main class="notion light-mode notion-page notion-block-c32c43ff0c424221983f65c8bc1fb605"><div class="notion-viewport"></div><div class="notion-collection-page-properties"></div><div class="notion-text notion-block-1055be96bd764d77b20d4e979c01d569">写在开头：</div><blockquote class="notion-quote notion-block-673041ead2ba48dca0a6bf8f2030c14d"><div>最近为了准备ISCTF的套娃题，想起来可以外层套一个取证的皮，但是本来的环境因为电脑重装就无了，所以重新用虚拟机搭了一个Win7的环境，然后遇到了几个之前遇到过的问题，那个时候没有记录，导致配环境浪费了很多时间，这边就小小的记录一下吧。         win7取证的话，硬盘容量建议开大一点，给25g，他自身好像是占了13g，然后一些补丁后续要加，我尝试了20G，容量不够，25G就足够的空间了</div></blockquote><div class="notion-blank notion-block-d14f08fb1bc94579a10f6d9ff3794167"> </div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-fe7f86716666446a972e97fec528ce99" data-id="fe7f86716666446a972e97fec528ce99"><span><div id="fe7f86716666446a972e97fec528ce99" class="notion-header-anchor"></div><a class="notion-hash-link" href="#fe7f86716666446a972e97fec528ce99" title="Step1:环境镜像"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">Step1:环境镜像</span></span></h4><div class="notion-text notion-block-5d0165305fc043dd94a4156bc652d74b"> 我使用的是VMware搭的虚拟机，去官网下的镜像，这边就直接放一篇博客了，<a target="_blank" rel="noopener noreferrer" class="notion-link" href="https://blog.csdn.net/qq_41649001/article/details/105989173#:~:text=%E9%95%9C%E5%83%8F%E7%9A%84%E4%B8%8B%E8%BD%BD%20%E7%99%BE%E5%BA%A6%E7%BD%91%E7%9B%98%E5%9C%B0%E5%9D%80,%28%E5%B7%B2%E4%B8%8B%E8%BD%BD%E5%A5%BDwindowss7%2064%29%3A%E9%93%BE%E6%8E%A5%EF%BC%9Ahttps%3A%2F%2Fpan.baidu.com%2Fs%2F1jPjqITI_U9f5v3tnis1F-g%20%E6%8F%90%E5%8F%96%E7%A0%81%EF%BC%9Arbh4">参考博客</a>，镜像版本选取什么应该大抵是没什么问题的，实在要参考的话，我这边选择的是这款，怎么有两款，忘了是哪款了，自己试试吧，应该是64位的那款。</div><div class="notion-blank notion-block-347d3fb560b14e82bee3cfc5314a98ce"> </div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-871832a1084c4988b6799026e6906f19"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F7be876d1-f9de-4811-a0c3-d067b4c565f2%2Fimage_(1).png?table=block&amp;id=871832a1-084c-4988-b679-9026e6906f19" alt="notion image" loading="lazy" decoding="async"/></div></figure><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-22b5782190904e3c9499ac064c7c25b4" data-id="22b5782190904e3c9499ac064c7c25b4"><span><div id="22b5782190904e3c9499ac064c7c25b4" class="notion-header-anchor"></div><a class="notion-hash-link" href="#22b5782190904e3c9499ac064c7c25b4" title="Step2:SP1问题"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">Step2:SP1问题</span></span></h4><div class="notion-text notion-block-790a9d54c0fd4ec186f6d82327072fa0"> 出题最主要的就是问个SP1问题了，为什么捏，因为我想安装vmtools，否则我的附件以及dump出来的内存镜像无法从虚拟机中导出来，看了网上几篇《很老》的教程，都是千篇一律的从微软官网下载补丁，然后移进去，然后安装补丁就好了，很简单，但是他们好像忽略了一个问题，没有vmtools，我根本移不进去啊（不知道是不是我虚拟机的问题）。凭借一个misc手的直觉，我最后发现了一个很好地方法，就是使用UltraISO。</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-5e6bd580973841ed90d9e13733ceba7b"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fd982233a-cac1-4ce5-9208-d5880fe333c2%2Fimage_(2).png?table=block&amp;id=5e6bd580-9738-41ed-90d9-e13733ceba7b" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-80e5cdb2c28549628d3489d8d5fd2372">我们可以把自己想要传入到虚拟机中的东西，用Ultra打包成iso镜像，然后直接丢进去。</div><div class="notion-text notion-block-c53b3b12711c4579819ec5712c58cfde">ps:试过插U盘，但是报错U盘无法解析</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-4aeda407cc794375a7bf7f6f743a0ee6" data-id="4aeda407cc794375a7bf7f6f743a0ee6"><span><div id="4aeda407cc794375a7bf7f6f743a0ee6" class="notion-header-anchor"></div><a class="notion-hash-link" href="#4aeda407cc794375a7bf7f6f743a0ee6" title="Step3:具体解决方法"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">Step3:具体解决方法</span></span></h4><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-90cab07913d04b3aaeb906905ce9cac1" data-id="90cab07913d04b3aaeb906905ce9cac1"><span><div id="90cab07913d04b3aaeb906905ce9cac1" class="notion-header-anchor"></div><a class="notion-hash-link" href="#90cab07913d04b3aaeb906905ce9cac1" title="1、创建ISO镜像"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">1、创建ISO镜像</span></span></h4><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-239ecfe7a42e4b2191ad3257f05d7b9e"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F9d9dfe36-7b3c-49ce-896c-d4bb63bda6b6%2Fimage_(3).png?table=block&amp;id=239ecfe7-a42e-4b21-91ad-3257f05d7b9e" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-0597dea6e1024f35b94624c0862742ef">我们将自己想要移到虚拟机中的文件移动到右上方的地方，就直接点住图标拖过去就行，然后点左上角直接保存即可</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-02c1f4abb7d1429e9f6cea6da7a84604" data-id="02c1f4abb7d1429e9f6cea6da7a84604"><span><div id="02c1f4abb7d1429e9f6cea6da7a84604" class="notion-header-anchor"></div><a class="notion-hash-link" href="#02c1f4abb7d1429e9f6cea6da7a84604" title="2、导入镜像"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">2、导入镜像</span></span></h4><div class="notion-text notion-block-8446119b3a8b4cd9836a587cdc4c562a">然后我们打开VMware win7的虚拟机，导入ISO镜像即可</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-07b003b477054de0ab9e065bc63eea82"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F7978a937-dd94-469e-a682-a01f7c265057%2Fimage_(4).png?table=block&amp;id=07b003b4-7705-4de0-ab9e-065bc63eea82" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-2c18f6af3a6245919f975e67282a950d">然后就打开虚拟机就可以啦</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-0901fa2c94764b46aef542d8f145d1d9" data-id="0901fa2c94764b46aef542d8f145d1d9"><span><div id="0901fa2c94764b46aef542d8f145d1d9" class="notion-header-anchor"></div><a class="notion-hash-link" href="#0901fa2c94764b46aef542d8f145d1d9" title="3、打开文件"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">3、打开文件</span></span></h4><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-e98418b615f34d598d76fb570ee557d6"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F42c5047e-73be-46ea-bbab-03419db40732%2Fimage_(5).png?table=block&amp;id=e98418b6-15f3-4d59-8d76-fb570ee557d6" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-61098c4e9462440496d92e18ed49cef2">打开驱动</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-b2ca4ae0d4e541139161040f0f3e7e14"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F20e3f8d7-f84f-4ac6-893b-0f52ac95d61f%2Fimage_(6).png?table=block&amp;id=b2ca4ae0-d4e5-4113-9161-040f0f3e7e14" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-cab967080786482bbd588abb33ae885c">将里面的内容移到桌面上就好了</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-a192aafc4fc743258369d314b9ee9a40" data-id="a192aafc4fc743258369d314b9ee9a40"><span><div id="a192aafc4fc743258369d314b9ee9a40" class="notion-header-anchor"></div><a class="notion-hash-link" href="#a192aafc4fc743258369d314b9ee9a40" title="Step4:打补丁"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">Step4:打补丁</span></span></h4><div class="notion-text notion-block-7c7d8131aab6425faf8c9166a27d77c4">这边有两个补丁要打，一个是更新程序？还有一个就是sp1</div><div class="notion-text notion-block-a85ded0da8d74d03827b9d5a73f8d010">可以自己去官网下，链接自己找，用IDM下很快，或者用我的百度网盘（没会员就不怪我了奥，大小1.4G，体验30s应该也可以下一大部分），顺便把dump.exe也给啦，一个32位的，一个64位的，自己对应版本使用即可</div><div class="notion-text notion-block-7e86f854e47a47cd880b651b6e4ab629">链接：https://pan.baidu.com/s/1r5AcV9z7UxV3-SdjdFNaYA?pwd=yv4m 提取码：yv4m</div><div class="notion-text notion-block-03e0ff0b9dbf4d5aa221e5d4fe55623d">然后我记得好像是先装exe那个？无所谓，自己都试一试，两个装完之后就可以快乐地安装vmtools了。</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-29dee8bd1b37444f9eade6a948d32100" data-id="29dee8bd1b37444f9eade6a948d32100"><span><div id="29dee8bd1b37444f9eade6a948d32100" class="notion-header-anchor"></div><a class="notion-hash-link" href="#29dee8bd1b37444f9eade6a948d32100" title="Step5:开始出题"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">Step5:开始出题</span></span></h4><div class="notion-text notion-block-9be5fc9c2810472e918d1e0c8a2e7db6">我这边是设置了两个考点，一个是开机密码是flag123456，他是以hash存储的，是可以解出来的。还有一个就是桌面上的文件</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-8985812d433d451f8c461f4109f9e3b2"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F8c58edd1-34c9-405b-826f-89a025ebdec1%2Fimage_(7).png?table=block&amp;id=8985812d-433d-451f-8c46-1f4109f9e3b2" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-3f9eedc4523848e09d68eed85a5d9e7c">把你想要的东西放在桌面上，进阶一点，你可以在你的命令行里打一些命令，或者在你的剪切板，ie浏览器里访问一些网站，这些就靠你自己去尝试啦。最后运行dumpit.exe就好了，直接拖到终端运行即可</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-9ef99ac5490f4b11bf662d114cacf711"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fb1aafb4b-56ca-48b8-8851-9ba01ab36389%2Fimage_(8).png?table=block&amp;id=9ef99ac5-490f-4b11-bf66-2d114cacf711" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-b287a23568524d97a85a324012bae3ee">然后按下y，一个题目就出好咯，可以去欺负小新生了，下班！</div><div class="notion-blank notion-block-0f331e02c01e4ef5ac32a01c4898a63a"> </div><div class="notion-blank notion-block-e41e7523e4b442ecacca423b78dfe479"> </div><div class="notion-blank notion-block-15912bf17a0246d2a97808c06368e615"> </div><div class="notion-blank notion-block-4266428fa5aa4be6909125d515ae44d8"> </div></main></div>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[《套神看了都摇头》出题记录]]></title>
            <link>https://tangly1024.com/article/2</link>
            <guid>https://tangly1024.com/article/2</guid>
            <pubDate>Wed, 02 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[isctf出题记录]]></description>
            <content:encoded><![CDATA[<div id="container" class="mx-auto undefined"><main class="notion light-mode notion-page notion-block-8c35e75ff56944938e21fb27a3411645"><div class="notion-viewport"></div><div class="notion-collection-page-properties"></div><blockquote class="notion-quote notion-block-071f3885b7ce43c0ab13a6a256c510f4"><div>写在开头：想把misc的一些简单的知识点串在一起，更考核选手的综合能力，但是胡乱的套会导致其中解码过程中出现很多的错误，所以需要给选手一些明确的hint，比如用什么网站进行的加密，比如一个简单的例子，千千秀字的栅栏，用bugku是解不出来的（反正我枚举解不出，就当他解不出了），这些知识点都是我学习misc刚开始一个月里面刷的题，所以就选用了过来。</div></blockquote><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-f0178f41c0c74811acd8c90222b5fb53" data-id="f0178f41c0c74811acd8c90222b5fb53"><span><div id="f0178f41c0c74811acd8c90222b5fb53" class="notion-header-anchor"></div><a class="notion-hash-link" href="#f0178f41c0c74811acd8c90222b5fb53" title="flag"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">flag</span></span></h4><div class="notion-text notion-block-833696457ae6403d8bf74a06b7711434">首先拿到了一个flag</div><div class="notion-text notion-block-7db6bc0bb96c41a1bd737471497482f5">ISCTF{W0_b8_4_t4O_sH3n_!!!_Sh31_4_t40_sheN}</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-b232f89a168d4414998dec5493caefd2" data-id="b232f89a168d4414998dec5493caefd2"><span><div id="b232f89a168d4414998dec5493caefd2" class="notion-header-anchor"></div><a class="notion-hash-link" href="#b232f89a168d4414998dec5493caefd2" title="千千秀字栅栏"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">千千秀字栅栏</span></span></h4><div class="notion-text notion-block-a006f001cc264c1a9d3ce57e206ed530">给出了一个千千秀字的hint，先留档</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">IW4s!10}S0_H!__C_t3_4sTb4nS_hF8O_hte{__!34N</code></pre><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-d6d5c59af411468faf77de36a14a173a" data-id="d6d5c59af411468faf77de36a14a173a"><span><div id="d6d5c59af411468faf77de36a14a173a" class="notion-header-anchor"></div><a class="notion-hash-link" href="#d6d5c59af411468faf77de36a14a173a" title="与佛论禅"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">与佛论禅</span></span></h4><div class="notion-text notion-block-7ba13e64052549f894c793aa40c1fe3b">佛曰有好几种，新佛曰跟佛曰，我这边出了一个问题就是与佛论禅也有两种，一种是佛曰，一种是佛又曰，这两个的网址是不一样的</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-d8b73f581d134214a7f13ddcc31b906f"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F2758159d-4c81-4b92-be67-76c6c653f06c%2Fimage_(9).png?table=block&amp;id=d8b73f58-1d13-4214-a7f1-3ddcc31b906f" alt="notion image" loading="lazy" decoding="async"/></div></figure><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-6e62952e708446d5894fff982b258dbf"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F5e937c13-1d7d-459f-8c3e-069b70cd075f%2Fimage_(10).png?table=block&amp;id=6e62952e-7084-46d5-894f-ff982b258dbf" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-46120d8f11e743df96195240431b1764">虽然说问题不大，但是谨记</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">佛又曰：楞苏喝帝婆醯伽婆夜婆数遮钵娑孕度利伽咩唵钵呼度曳婆写曳尼迦卢罚数菩伽嚧阇耶俱钵阿地怛度卢咩阇萨钵俱数帝舍伽呼写阇遮墀楞室提豆哆咩数输咩谨皤俱吉怛驮伊伽埵漫漫</code></pre><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-870aa3b44a5640138e4eba06b2568155" data-id="870aa3b44a5640138e4eba06b2568155"><span><div id="870aa3b44a5640138e4eba06b2568155" class="notion-header-anchor"></div><a class="notion-hash-link" href="#870aa3b44a5640138e4eba06b2568155" title="base64"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">base64</span></span></h4><div class="notion-text notion-block-d5f45a0f9e0647628b24390a03dba250">然后就是简单的套了一个base</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">5L2b5Y+I5puw77ya5qWe6IuP5Zad5bid5amG6Yav5Ly95amG5aSc5amG5pWw6YGu6ZK15aiR5a2V5bqm5Yip5Ly95ZKp5ZS16ZK15ZG85bqm5puz5amG5YaZ5puz5bC86L+m5Y2i572a5pWw6I+p5Ly95Zqn6ZiH6IC25L+x6ZK16Zi/5Zyw5oCb5bqm5Y2i5ZKp6ZiH6JCo6ZK15L+x5pWw5bid6IiN5Ly95ZG85YaZ6ZiH6YGu5aKA5qWe5a6k5o+Q6LGG5ZOG5ZKp5pWw6L6T5ZKp6LCo55qk5L+x5ZCJ5oCb6amu5LyK5Ly95Z+15ryr5ryr</code></pre><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-1dd6c9b6d6c84ed7aabbf9ac308bb6ef" data-id="1dd6c9b6d6c84ed7aabbf9ac308bb6ef"><span><div id="1dd6c9b6d6c84ed7aabbf9ac308bb6ef" class="notion-header-anchor"></div><a class="notion-hash-link" href="#1dd6c9b6d6c84ed7aabbf9ac308bb6ef" title="AES(https://www.sojson.com/encrypt_aes.html)"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">AES(https://www.sojson.com/encrypt_aes.html)</span></span></h4><div class="notion-text notion-block-9de480ebc3494c1c92e84bba0c5ddf48">简单套一个AES，也是选用了最简单的无脑的没有偏移的AES，但是我不是很清楚他的key是怎么处理的，我使用相同的key去别的网站加密得到的不是一个密文（日后有空去看看，估计是没空的），所以这边也给出了hint，加密网站，按下不表*2</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">U2FsdGVkX19fGDp6HBRwc0ot+XQFmWrHPBhG0F2Y4JyJhRomofwFXBnUZUPnQc9V
hviHIwagGUMvhlGtnHOjWUN/69h1eku4YWeTL2bswkotj1GImP36TzV3G+z1yYqy
LGez1wUKbtuNpVfSU2/u79oAubWN8mVtMUalmNoYjtP3adjM5p/zXL6kul+kSJ95
BX50RqBV64MyFs1rNM7r3wI8W8FWNYpvDdzETKuCMEQwXtaH1HS6p/P5kuMT7OIW
3ViHDuthWBS+Z1sUZh6Hk2R4db3HrZYCLZ5QLpoNIt2ZrtVwMGPdLeI92v5w++0o
DmW2pD7FICDFEVXB+DH+WTvdTYfXGM6635R94r72bREmE1zELyMy3iMqiF7UOmd3
CfEhlz5aiv9RBGz2crCaDJ/ZMY9+qEj4JEYJJMFljKG71kXUC/xvNcGTb7oN4odk
OKV+I3Tuc8GcYq03zczLkA==

key=this_is_pass</code></pre><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-eb6198b24706459ba183070477efb274" data-id="eb6198b24706459ba183070477efb274"><span><div id="eb6198b24706459ba183070477efb274" class="notion-header-anchor"></div><a class="notion-hash-link" href="#eb6198b24706459ba183070477efb274" title="36进制"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">36进制</span></span></h4><div class="notion-text notion-block-ff73656c9f34449f91e840f870cbd0f2">这边是套了一个36进制，如果细心点的话，应该是可以发现里面文本的内容是从0-9，a-z，26个，然后我也是给hint了，生怕看不出来，36进制怎么转码呢，直接int 36就可以，然后再加个long_to_bytes就可以解码了</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">pfbshz6vy6cw9zqe9d2xuv0pevbyzmq3biqj0bbbywfowy6d2vcfamwd144au0bioijq7oyf32grvzxtodeob5quei6bufpganywzzvyuj0jv9fxn3ghgisaemw5d59ftp84lo4wseqohfhbfpily6s0d3bbs9kg5xvq481b2ykbucfwlb2290l84b9d8i7r1ofmlxtnwglzt1t3ko602oryor147dnnotdn2gmzd68yrg3lna118ppj7oygmf2yjn049fidfih3a6axagk2oxcq0diwilkahq6f0wvekvmcbzdeo44r9n6k2pdvrpubm0k1lb67f50811vaxgwbfyx2ti3w1rlvysmemq649qt8g4cjps62xss63mq30mi43mz695t1t2egqvh8q2hjr3s5mta9l5t8wid5s8q7im3sc4lsaxmc6j81macut49clhweomtrhh5d4pk0n6rfesfsesaj18w9x7otzu4v6p74vtpec8spkbhc99g04l2mz7zkk0bwghov60xgrr53f3e55bxi6ztlzwu23lwd9k985vrn4skbcb978i8knspffief1r8b7j5kdfabz8qw8sxcp70xmt9eqysxikcojpahyr9jq9opg115nz4zub2gfre0znbr0rdrw777h2h528yz1offlzfi610w6e4lwgh2o71ywdl6a6ursgb8mo2o54drm8x9cf0k89xbhb5pqwyjw0lvd4cvv8m65</code></pre><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-f369832fc44e46fdad1bc64a6f6c1ab8" data-id="f369832fc44e46fdad1bc64a6f6c1ab8"><span><div id="f369832fc44e46fdad1bc64a6f6c1ab8" class="notion-header-anchor"></div><a class="notion-hash-link" href="#f369832fc44e46fdad1bc64a6f6c1ab8" title="morese，wav"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">morese，wav</span></span></h4><div class="notion-text notion-block-3db527f66fd9486bb61aaea136252911">忘记复制密文了，这边应该是吧36进制转成莫斯了吧，出题脚本给你们看看</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-python">import timeimport winsoundfreq1=1500   #短音发声频率freq2=2000   #长音发声频率interv_short = 100  #短音“.”的发声时长interv_long = 300   #长音“-”的发声时长msg = input(&#x27;输入要发送的消息:&#x27;)msg = msg.upper()   #转换大写，摩斯码中不区分大小写code_dict = {&#x27;0&#x27;: &#x27;-----&#x27;, &#x27;1&#x27;: &#x27;.----&#x27;, &#x27;2&#x27;: &#x27;..---&#x27;, &#x27;3&#x27;: &#x27;...--&#x27;, &#x27;4&#x27;: &#x27;....-&#x27;,             &#x27;5&#x27;: &#x27;.....&#x27;, &#x27;6&#x27;: &#x27;-....&#x27;, &#x27;7&#x27;: &#x27;--...&#x27;, &#x27;8&#x27;: &#x27;---..&#x27;, &#x27;9&#x27;: &#x27;----.&#x27;,             &#x27;A&#x27;: &#x27;.-&#x27;, &#x27;B&#x27;: &#x27;-...&#x27;, &#x27;C&#x27;: &#x27;-.-.&#x27;, &#x27;D&#x27;: &#x27;-..&#x27;, &#x27;E&#x27;: &#x27;.&#x27;, &#x27;F&#x27;: &#x27;..-.&#x27;, &#x27;G&#x27;: &#x27;--.&#x27;,             &#x27;H&#x27;: &#x27;....&#x27;,&#x27;I&#x27;: &#x27;..&#x27;, &#x27;J&#x27;: &#x27;.---&#x27;, &#x27;K&#x27;: &#x27;-.-&#x27;, &#x27;L&#x27;: &#x27;.-..&#x27;, &#x27;M&#x27;: &#x27;--&#x27;, &#x27;N&#x27;: &#x27;-.&#x27;,             &#x27;O&#x27;: &#x27;---&#x27;, &#x27;P&#x27;: &#x27;.--.&#x27;,&#x27;Q&#x27;: &#x27;--.-&#x27;, &#x27;R&#x27;: &#x27;.-.&#x27;, &#x27;S&#x27;: &#x27;...&#x27;, &#x27;T&#x27;: &#x27;-&#x27;,             &#x27;U&#x27;: &#x27;..-&#x27;, &#x27;V&#x27;: &#x27;...-&#x27;, &#x27;W&#x27;: &#x27;.--&#x27;, &#x27;X&#x27;: &#x27;-..-&#x27;,&#x27;Y&#x27;: &#x27;-.--&#x27;, &#x27;Z&#x27;: &#x27;--..&#x27;,             &#x27;.&#x27;: &#x27;.-.-.-&#x27;, &#x27;:&#x27;: &#x27;---...&#x27;,&#x27;,&#x27;: &#x27;--..--&#x27;, &#x27;;&#x27;: &#x27;-.-.-.&#x27;, &#x27;?&#x27;: &#x27;..--..&#x27;,             &#x27;=&#x27;: &#x27;-...-&#x27;, &quot;&#x27;&quot;: &#x27;.----.&#x27;, &#x27;/&#x27;: &#x27;-..-.&#x27;, &#x27;!&#x27;: &#x27;-.-.--&#x27;,&#x27;--&#x27;: &#x27;-....-&#x27;,             &#x27;-&#x27;: &#x27;..--.-&#x27;, &#x27;&quot;&#x27;: &#x27;.-..-.&#x27;, &#x27;(&#x27;: &#x27;-.--.&#x27;, &#x27;)&#x27;: &#x27;-.--.-&#x27;}for m in range (len(msg)):    print(&#x27;m:&#x27;,m)    code = code_dict.get(msg[m])    if code is None:        print(&#x27;该符号不在字典中&#x27;)        continue    print(&#x27;code&#x27;,code)    for c in code:        if c == &#x27;.&#x27;:            ret = winsound.Beep(freq1,interv_short)            # print(&#x27;ret = &#x27;,ret)            time.sleep(0.1) #加入0.1s延时        elif c == &#x27;-&#x27;:            ret = winsound.Beep(freq2,interv_long)            # print(&#x27;ret = &#x27;,ret)            time.sleep(0.1)        else:            print(&#x27;错误编码&#x27;)    time.sleep(1)</code></pre><div class="notion-text notion-block-c519a270383a440da5a4620a51c65745">脚本也是网上B站上找的，不是自己写的，但是看了下也是可以理解的，主要就是winsound.Beep控制声音长短，发出声音，然后使用电脑的立体声混音录就好了（这个灵感来自春哥，之前看群里讨论mmstv看到的）</div><div class="notion-text notion-block-75f516b39a9e4b05aba2dd5dbac64c5e">然后就得到了一个.wav文件了</div><div class="notion-text notion-block-9e01a9d85d104407a0edacfb211d3658">这边将前面的hint都给到了Audacity的元数据标签里面（编辑元数据）</div><div class="notion-text notion-block-42732a87695d493e80681f62956f53bb">但是我没有保存，所以直接查看属性不能看到。</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-1afef712881f45c38f2695c7ebfc2141"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fd205d1b1-5a74-4d82-baee-1cea76e2be61%2Fimage_(11).png?table=block&amp;id=1afef712-881f-45c3-8f26-95c7ebfc2141" alt="notion image" loading="lazy" decoding="async"/></div></figure><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-a21a0b09e2e34c6dbf2611f633aa4e24" data-id="a21a0b09e2e34c6dbf2611f633aa4e24"><span><div id="a21a0b09e2e34c6dbf2611f633aa4e24" class="notion-header-anchor"></div><a class="notion-hash-link" href="#a21a0b09e2e34c6dbf2611f633aa4e24" title="百度网盘"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">百度网盘</span></span></h4><div class="notion-text notion-block-b0d9d96845fe4d14b8be7ed580ecb501">这边因为文件太大了，然后就直接转网盘变小</div><div class="notion-text notion-block-d83d1559438245c68889743f35089d7c">https://pan.baidu.com/s/1Hkp7pt-7Yg08_7v5zwFMuA?pwd=t51r</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-c1b4a10e4f63474bbbbf54f34b4f2191" data-id="c1b4a10e4f63474bbbbf54f34b4f2191"><span><div id="c1b4a10e4f63474bbbbf54f34b4f2191" class="notion-header-anchor"></div><a class="notion-hash-link" href="#c1b4a10e4f63474bbbbf54f34b4f2191" title="零宽"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">零宽</span></span></h4><div class="notion-text notion-block-163e8501381a410e98d00c45e86ae309">将百度网盘的链接存在一个零宽里面去，这边可能好多人都还没搞懂零宽到底怎么搞，只会复制进去，然后解码，其实很简单</div><div class="notion-text notion-block-bfa2ab4665214532b8bbf47b06e6be2e">一般来说怎么判断就是把字符全选，复制到kali虚拟机里面</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-f1cd7580ebfb40bba92434cb8e0399d8"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F94a7e91f-e4ec-4de7-b5b6-d7687cb2797e%2Fimage_(12).png?table=block&amp;id=f1cd7580-ebfb-40bb-a924-34cb8e0399d8" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-8a31912e34444ec6b704b20eded10002">我们可以看到，在字符串中有着许多的不可见字符就是Unicode字符，由此我们可以得到</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-2c7ec1957a884fc79bcbaa3f7ca1f097"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F11e35683-2514-4374-847c-4067ffc25d8d%2Fimage_(13).png?table=block&amp;id=2c7ec195-7a88-4fc7-9bcb-aa3f7ca1f097" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-71fc0761b7b3400cb7c7391eb8f67425">关于这边解密的东西，不是乱选的，而是根据上面所包含的字符来选的，然后直接decode就可以得到</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-df68272f2c6048b58a18f133dfd8921f" data-id="df68272f2c6048b58a18f133dfd8921f"><span><div id="df68272f2c6048b58a18f133dfd8921f" class="notion-header-anchor"></div><a class="notion-hash-link" href="#df68272f2c6048b58a18f133dfd8921f" title="压缩，逆序，转01，改黑白,出二维坐标index.txt"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">压缩，逆序，转01，改黑白,出二维坐标index.txt</span></span></h4><div class="notion-text notion-block-27541b8b4d2a45ff9fe126d0af31e06d">然后将得到的文本进行压缩包，然后读取，将他逆序，转成01字符串，再将01字符串转成黑白图片。可以将他看成二维数组，给出坐标。</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-python">from Crypto.Util.number import *import mathimport PILfrom PIL import Imagewith open(&#x27;flag.zip&#x27;,&#x27;rb&#x27;) as f:    data  = f.read()[::-1]    a=bin(bytes_to_long(data))[2:].zfill(len(data)*8)print(len(a))print(math.sqrt(48432))print(221*221-48432)# print(long_to_bytes(int(a,2)))a=&#x27;0&#x27;*409+aMAX = 221img = Image.new(&quot;RGB&quot;,(MAX,MAX))str1 = ai=0print(str1[53])with open(&#x27;index.txt&#x27;,&#x27;w&#x27;) as f:    for y in range (0,MAX):        for x in range (0,MAX):            # print(i)            # print(str1)            if(str1[i] == &#x27;1&#x27;):                img.putpixel([x,y],(0, 0, 0))                str2=str(x)+&#x27;,&#x27;+str(y)                f.write(str2)                f.write(&#x27;\n&#x27;)            else:                img.putpixel([x,y],(255,255,255))            i = i+1# img.show()f.close()img.save(&quot;1.png&quot;)</code></pre><div class="notion-text notion-block-58e73930ba1742fc8105c3281d6069f7">这边是给了一个hint的，就是梅花香自苦寒来，这算是我第一个接触python写脚本的题目吧，buu上比较靠前的一个misc题的（不知道师傅们能不能理解，如果不能理解的话给大家磕个头了）解题脚本就不给了，网上搜一搜就有了</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-d6f40e15dfca450292c4d13e9158ab72" data-id="d6f40e15dfca450292c4d13e9158ab72"><span><div id="d6f40e15dfca450292c4d13e9158ab72" class="notion-header-anchor"></div><a class="notion-hash-link" href="#d6f40e15dfca450292c4d13e9158ab72" title="flag.png oursecret 秘钥：lsb"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">flag.png oursecret 秘钥：lsb</span></span></h4><div class="notion-text notion-block-a31e9c48719640bf9d0bfb191fe8684f">一个oursecret，藏文件，经典，秘钥就藏在lsb里面了</div><pre class="notion-code"><div class="notion-code-copy"><div class="notion-code-copy-button"><svg fill="currentColor" viewBox="0 0 16 16" width="1em" version="1.1"><path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg></div></div><code class="language-plain text">藏坐标 index.txt</code></pre><div class="notion-text notion-block-b7fb4c6fcec54bdd871a24b70d16d298">秘钥 isctfgood</div><div class="notion-text notion-block-2aeb7844380d4b75bb01f5efd0d2c61c">然后再进行一次百度网盘缩小</div><div class="notion-text notion-block-f5f17b503dbc4096b5e6929da69d3518">百度网盘 https://pan.baidu.com/s/1QjFr09a7XRS5J7ZXAPbJsQ?pwd=tpde</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-8c97eab7d727478e98d12f28d34bf7fd" data-id="8c97eab7d727478e98d12f28d34bf7fd"><span><div id="8c97eab7d727478e98d12f28d34bf7fd" class="notion-header-anchor"></div><a class="notion-hash-link" href="#8c97eab7d727478e98d12f28d34bf7fd" title="slienteye 秘钥"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">slienteye 秘钥</span></span></h4><div class="notion-text notion-block-e457a2f5a0fc48c49dcdab8f69db02f2">将链接藏在一个jpg文件中</div><div class="notion-text notion-block-58c215a7027549e09842045c70af6e58">这边在出题的时候发现了一个很神奇的现象（之后再去研究研究，有懂的师傅可以告诉我呜呜）</div><figure class="notion-asset-wrapper notion-asset-wrapper-image notion-block-67d6b4815ca140509dcc93858801465a"><div style="position:relative;display:flex;justify-content:center;align-self:center;width:100%;max-width:100%;flex-direction:column;height:100%"><img style="object-fit:cover" src="https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F0e77cb7c-18d5-4a60-9ce0-7eb3fd851bd4%2Fimage_(14).png?table=block&amp;id=67d6b481-5ca1-4050-9dcc-93858801465a" alt="notion image" loading="lazy" decoding="async"/></div></figure><div class="notion-text notion-block-ac59c279995941b5839a32bbd54cd7c0">秘钥就是jpg图片改宽高，这个考点不是很常见，所以也给了hint，但是不能改差，改出错了会导致slienteye读不出来数据了</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-22f64970e9904e7a93d4bf2309ed7b66" data-id="22f64970e9904e7a93d4bf2309ed7b66"><span><div id="22f64970e9904e7a93d4bf2309ed7b66" class="notion-header-anchor"></div><a class="notion-hash-link" href="#22f64970e9904e7a93d4bf2309ed7b66" title="ftp文件传输流量"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">ftp文件传输流量</span></span></h4><div class="notion-text notion-block-e5d855640d0f49f9828fadba12f4902b">简单的套一层流量，水平有限，并且考虑到比赛新生难度，也是没有出的很奇怪，直接导出数据就可以了</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-6d11d0f3f4f24c5680cc414492f6e47d" data-id="6d11d0f3f4f24c5680cc414492f6e47d"><span><div id="6d11d0f3f4f24c5680cc414492f6e47d" class="notion-header-anchor"></div><a class="notion-hash-link" href="#6d11d0f3f4f24c5680cc414492f6e47d" title="套个取证，desktop压缩包 压缩包密码是开机，密码"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">套个取证，desktop压缩包 压缩包密码是开机，密码</span></span></h4><div class="notion-text notion-block-c1ff8ec680d4488cb8f790c32387434b">这边就是最开始了地方了，一个找取证的密码，一个filescan。</div><h4 class="notion-h notion-h3 notion-h-indent-0 notion-block-d58ddd8206b7481d9d78bbe3f1e8521b" data-id="d58ddd8206b7481d9d78bbe3f1e8521b"><span><div id="d58ddd8206b7481d9d78bbe3f1e8521b" class="notion-header-anchor"></div><a class="notion-hash-link" href="#d58ddd8206b7481d9d78bbe3f1e8521b" title="总结"><svg viewBox="0 0 16 16" width="16" height="16"><path fill-rule="evenodd" d="M7.775 3.275a.75.75 0 001.06 1.06l1.25-1.25a2 2 0 112.83 2.83l-2.5 2.5a2 2 0 01-2.83 0 .75.75 0 00-1.06 1.06 3.5 3.5 0 004.95 0l2.5-2.5a3.5 3.5 0 00-4.95-4.95l-1.25 1.25zm-4.69 9.64a2 2 0 010-2.83l2.5-2.5a2 2 0 012.83 0 .75.75 0 001.06-1.06 3.5 3.5 0 00-4.95 0l-2.5 2.5a3.5 3.5 0 004.95 4.95l1.25-1.25a.75.75 0 00-1.06-1.06l-1.25 1.25a2 2 0 01-2.83 0z"></path></svg></a><span class="notion-h-title">总结</span></span></h4><div class="notion-text notion-block-aafde639f92a4082bfb66c628bca2fdc">个人感觉还是搜一搜，可以做的，emmmm，给大家磕一个</div></main></div>]]></content:encoded>
        </item>
    </channel>
</rss>