[GKCTF 2021]签到

[GKCTF 2021]签到

imHnq48f5PWFZtjkVYJOe8azqoJpTzIYSg6In-3fY20

附件是一个流量包,追踪TCP流发现编码过的信息

VLlFwKKLJX8QeBgkxPsyIO6uqOtloOX9nXIYzII35YQ

首先是十六进制转字符

RGlzpvHQaS6AoIcupFEwitFo2qdHfR5ZCMQq3EhYT7o

发现是base64编码,然后对其进行解码发现是倒序的文件名

APRVK5zbo0ZFe2Dy4p1LshFOVmrsmM-w0Ndk34dnsv0

将http数据全部导出,找到2KB的tmpshell(19).php打开

64306c455357644251306c6e51554e4a5a3046355355737764306c7154586c4a616b31355357704e65556c7154586c4a616b31355357704e65556c7154586c4a616b31355357704e65556c7154586c4a616b31355357704e65556c7154576c44546d39525241707154586c4a616b31355357704e65556c7154586c4a616b31355357704e65556c7154586c4a616b31355357704e65556c7162314645616b46445357644251306c6e51554e4a5a32644554545a46524530325157704e5a3046365458524e524531305257704e436e5177553078304d464e4d6444425454485177553078304d464e4d6444425454485177553078304d464e4d6444425454485177553078304d464e4d6444425454485177553078304d464e4d644442705130354e65556c7154586c4a616b31355357704e65556b4b4e6b467154576442656b31305455524e644556715458644a616b38775a566f324d6d56774e557377643074795556645a64315a485a48593152556c3051576c4e4d5546355a4777316255733254545a7162475a7763573579555552304d464e4d64444254544170304d464e4d6444425454485177553078304d464e4d6444425454485177553078304d464e4d6444425454485177553078304d464e4d6444425454485177553078304d464e4d537a42425357526159585a764e7a567462485a735130354e564530325255524e436e6f77655531334d464e4e6555467154545a524e327877596a647362584a5252484a7a5131706f516c68614d446c745647637751306c355655524a4d315a74596e4676656d3951567974736357563151303477553078304d464e4d64444254544851775530774b63336858576d786b4d5659354d544e6c4e325179576d684752324a7a576d31615a7a427363446c7064573569567974585a7a427363446c7064573569567974585a7a427363446c706457356956797458537a423354586876564531336230524e6555464454517045546a4252524534775555527356324636546c684e65444258596d593562464a48556b524f5245347759584a6b4d464a6d4f565a6162444658596e644252456c6b556d46746345524c61577832526b6c6b556d46746345524c61577832566b747754544a5a436a303955556c6f545442525245347755516f3d

转为字符

UCye4Nf1gkLJxC653f4we0Smmmn5JiLKvKuDuDcY2Ak

base64解码

UMNjSGWBtjQ6v8cJqgWYH8Rqv0f5-KGhoZDtYChaRXI

保存为txt后到kali中输入命令进行倒序解码

rev tmp.txt > tmpshell.txt
cat tmpshell.txt | base64 -d > result.txt

打开后发现flag

FjVUk_kE_0qR_vBBG1cFnNI0uOUVP8OkEK2w6LjD6Qc

去重,得到flag{Welc0me_GkC4F_m1siCCCCCC!}

flag{Welc0me_GkC4F_m1siCCCCCC!}

posted on   跳河离去的鱼  阅读(354)  评论(0编辑  收藏  举报

相关博文:
阅读排行:
· 阿里最新开源QwQ-32B,效果媲美deepseek-r1满血版,部署成本又又又降低了!
· 开源Multi-agent AI智能体框架aevatar.ai,欢迎大家贡献代码
· Manus重磅发布:全球首款通用AI代理技术深度解析与实战指南
· 被坑几百块钱后,我竟然真的恢复了删除的微信聊天记录!
· AI技术革命,工作效率10个最佳AI工具
< 2025年3月 >
23 24 25 26 27 28 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5

统计

点击右上角即可分享
微信分享提示