作者:itsima | 来源:互联网 | 2023-08-14 15:16
WriteUp
- 这是一个坑
- flag.xls
- 图片里的动漫
- 保险箱
涨姿势
- Canon
- BAT公司信息查询系统
- 社交网络
- 矛盾的in2
这是一个坑
原题
![这里写图片描述](https://img.php1.cn/3cd4a/1eebe/cd5/bff2716168d1ed7b.webp','wb')<br> fsave.write(base64.b64decode(f))<br> fsave.close()<br> pass<br><br>if __name__ == '__main__':<br> foo()<br> pass<br></code></pre><p><img src=)
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzE5MjIwNTQ3NjIyP3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
涨姿势点
网站解不开的base64,脚本未必就解不开
备注
刚得到pic_png.txt时就判断为base64编码,但是直接拿到网站上解码时却得到的数据却无法用于生成png图像,而用Python脚本就可以。按理说base64编码和解码的规则都是固定的不应该一个可以解码一个不能解码才对,真是奇怪。这道题我也是因为网站上得到的数据无法用于生成png才看的WP
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzE5MjIxMDM0MDAyP3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
BAT公司信息查询系统
原题
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjI1MzM1Mzc5P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
解题思路
扫码,得到源代码,绕过,一句话木马
WriteUp
满屏的二维码,扫一下
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjI1NjExOTA5P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
访问该文件得到源代码
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjI1NzEyMzIwP3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
这里考察PHP弱类型,只要提交0.99999999999999999(至少17个9)即可绕过,绕过后来到一个404页面
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjI1ODQ3NDU5P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
页面源代码中暗藏玄机
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjI1OTE5NTcyP3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
那句注释是一句话木马由ANSI转Unicode得到的,解密即可
以下引用自实验吧@pcat
解密方法:把上面这串复制到记事本,另存为,编码选上“Unicode”,关闭。用WinHex等可以查看16进制的软件,直接打开,一目了然。如果想显示正常,把开头的FF FE两个字节删了,再用记事本打开就看到了。
原理是:Windows平台下默认的Unicode编码为Little Endian的UTF-16,UTF-16就需要通过在文件开头以名为BOM(Byte Order Mark)的字符来表明文件是Big Endian还是Little Endian。BOM为U+FEFF这个字符。
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjMwMjQ2MjUzP3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
涨姿势点
字符串由ANSI转Unicode以及解密方法
社交网络
原题
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjMyMjM4Mjk4P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
解题思路
三个脑洞
WriteUp
解压需要密码,密码哪里来?
Binwalk和HxD都没发现有用的信息,那就是题目自身里面了
Birthday一般是有8为数字组成,所以猜测密码为8位数字,爆破它
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjMyNTA4NzI2P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
得到图片,就觉得还有脑洞,直接看下属性
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjMyNjA0OTIzP3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIxMjMyNjIyNDQ5P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
最后还有一个脑洞,就是直接提交大括号里面的内容
涨姿势点
全靠脑洞解题也是第一次
矛盾的in2
原题
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIzMjMzNTI1MzY4P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
解题思路
突兀的数字,进制转换,还有一个不知道为什么的小写
WriteUp
右键源代码发现一些突兀出现的数字
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIzMjMzNzQ3NTg1P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
最大就15,估计是16进制,转换一下看看
![这里写图片描述](https://www.#.com/go/aHR0cDovL2ltZy5ibG9nLmNzZG4ubmV0LzIwMTcwNzIzMjM0NjQ3OTM2P3dhdGVybWFyay8yL3RleHQvYUhSMGNEb3ZMMkpzYjJjdVkzTmtiaTV1WlhRdmMybHVZWFJmTXpReU1EQTNPRFk9L2ZvbnQvNWE2TDVMMlQvZm9udHNpemUvNDAwL2ZpbGwvSTBKQlFrRkNNQT09L2Rpc3NvbHZlLzcwL2dyYXZpdHkvU291dGhFYXN0)
最后是不知道为什么的小写,就是D改为小写
涨姿势点
虽然有一串突兀的数字在源代码中,但我没当回事,然后一直找不到突破口