[GXYCTF2019]gakki

[GXYCTF2019]gakki

下载下来是一张图片,7zip打开可以直接看到后面有隐写图片

直接用foremost分离

image-20220728195637230

image-20220728195645391

rar文件有密码,直接用archpr爆破出密码

image-20220728195841909

解密之后,发现文件里面有很长的字符串,这里有一种思路,就是统计里面出现的字符个数,根据出现的次数排列就可以获得flag

alphabet = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890!@#$%^&*()_+- =\\{\\}[]"
strings = open('flag.txt').read()

result = {}
for i in alphabet:
	counts = strings.count(i)
	i = '{0}'.format(i)
	result[i] = counts

res = sorted(result.items(),key=lambda item:item[1],reverse=True)
for data in res:
	print(data)

for i in res:
	flag = str(i[0])
	print(flag[0],end="")

运行结果:

image-20220728200438928

然后直接手打这些flag就行,把前缀改成flag

flag{gaki_IsMyw1fe}

posted @ 2022-07-28 20:11  Jinx8823  阅读(207)  评论(0编辑  收藏  举报