欢迎您访问程序员文章站本站旨在为大家提供分享程序员计算机编程知识!
您现在的位置是: 首页

ISCC2018 Misc WriteUp

程序员文章站 2022-05-14 08:09:45
...

1.What is that?   [分值:50]

题目描述:

Where is the FLAG?
文件下载地址:
http://iscc2018.isclab.org.cn:4000/static/uploads/e8b1b391b0fec74623d43950fb95458a/ISCC-MISC05.rar

附件中为一张图片。png格式:

ISCC2018 Misc WriteUp

用010editor未发现有什么附加数据。其他的文件信息也没发现什么线索。

上传到谷歌识图显示分辨率太大,分辨率太大,分辨率太大。文件右键信息是625*500.这明显不大,用010editor把分辨率改大。

ISCC2018 Misc WriteUp

就看到flag了。

ISCC2018 Misc WriteUp

2.秘密电报 [分值:50]

题目描述:

秘密电报:
知识就是力量 ABAAAABABBABAAAABABAAABAAABAAABAABAAAABAAAABA

搜一下就知道是培根密码了。网上找了一段代码:

# coding:utf8

import re

alphabet = ['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z']

first_cipher = ["aaaaa","aaaab","aaaba","aaabb","aabaa","aabab","aabba","aabbb","abaaa","abaab","ababa","ababb","abbaa","abbab","abbba","abbbb","baaaa","baaab","baaba","baabb","babaa","babab","babba","babbb","bbaaa","bbaab"]

second_cipher = ["aaaaa","aaaab","aaaba","aaabb","aabaa","aabab","aabba","aabbb","abaaa","abaaa","abaab","ababa","ababb","abbaa","abbab","abbba","abbbb","baaaa","baaab","baaba","baabb","baabb","babaa","babab","babba","babbb"]

def encode():
    upper_flag = False # 用于判断输入是否为大写
    string = raw_input("please input string to encode:\n")
    if string.isupper():
        upper_flag = True
        string = string.lower()
    e_string1 = ""
    e_string2 = ""
    for index in string:
        for i in range(0,26):
            if index == alphabet[i]:
                e_string1 += first_cipher[i]
                e_string2 += second_cipher[i]
                break
    if upper_flag:
        e_string1 = e_string1.upper()
        e_string2 = e_string2.upper()
    print "first encode method result is:\n"+e_string1
    print "second encode method result is:\n"+e_string2
    return


def decode():
    upper_flag = False  # 用于判断输入是否为大写
    e_string = raw_input("please input string to decode:\n")
    if e_string.isupper():
        upper_flag = True
        e_string = e_string.lower()
    e_array = re.findall(".{5}",e_string)
    d_string1 = ""
    d_string2 = ""
    for index in e_array:
        for i in range(0,26):
            if index == first_cipher[i]:
                d_string1 += alphabet[i]
            if index == second_cipher[i]:
                d_string2 += alphabet[i]
    if upper_flag:
        d_string1 = d_string1.upper()
        d_string2 = d_string2.upper()
    print "first decode method result is:\n"+d_string1
    print "second decode method result is:\n"+d_string2
    return


if __name__ == '__main__':
    print "\t\tcoding by qux"
    while True:
        print "\t*******Bacon Encode_Decode System*******"
        print "input should be only lowercase or uppercase,cipher just include a,b(or A,B)"
        print "1.encode\n2.decode\n3.exit"
        s_number = raw_input("please input number to choose\n")
        if s_number == "1":
            encode()
            raw_input()
        elif s_number == "2":
            decode()
            raw_input()
        elif s_number == "3":
            break
        else:
            continue

运行得到答案:

input should be only lowercase or uppercase,cipher just include a,b(or A,B)
1.encode
2.decode
3.exit
please input number to choose
2
please input string to decode:
ABAAAABABBABAAAABABAAABAAABAAABAABAAAABAAAABA
first decode method result is:
ILIKEISCC                             <---  这个是答案
second decode method result is:
IJMIJLEIJTCC

3.重重谍影 [分值:100]

题目描述:

重重谍影
这是一道脑洞题,简单的要命。层层迷雾之后就是答案,刹那便是永恒。南无阿弥陀佛。

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

这是一道脑洞相当大的题目,能做出来完全靠运气,靠某些网站。

下边的字符串是base64,解码之后会发现有%3d %0a这样的字符,猜测是urlencode.

所以同时用base64和urlencode解密。

import base64
from urllib import unquote   
 
str_text="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"


str_xx=str_text
for i in range(0,100):    
    str_xx=base64.b64decode(str_xx)
    str_xx=unquote(str_xx)
    print i,str_xx

运行10次左右就崩溃了。发现第七次是明文:

7 U2FsdGVkX183BPnBd50ynIRM3o8YLmwHaoi8b8QvfVdFHCEwG9iwp4hJHznrl7d4
B5rKClEyYVtx6uZFIKtCXo71fR9Mcf6b0EzejhZ4pnhnJOl+zrZVlV0T9NUA+u1z
iN+jkpb6ERH86j7t45v4Mpe+j1gCpvaQgoKC0Oaa5kc=

第一次做到这里就卡住了。。。。。后来佛系到答案。 上边的字符串是AES加密的字符串(请问怎么看出来的?)

在此网站http://tool.oschina.net/encrypt 解密,只能用这个网站哦,因为只有这个网站解密不要密码。

ISCC2018 Misc WriteUp

明文的第二句就是答案。要解开这个谜底需要另外一个佛系网站:http://www.keyfc.net/bbs/tools/tudoucode.aspx

解密方法:

ISCC2018 Misc WriteUp

在密文前面添加“佛曰“ 然后点击按钮,解出来的就是答案。

4.有趣的ISCC [分值:100]

题目描述:

在ISCC的平台上,跟小伙伴们一起闯关,是不是很有趣啊!!!
猜猜我在图片中隐藏了什么?

一张图片,010editor发现结尾有数据隐藏:

ISCC2018 Misc WriteUp

提取出来大概是这样:

ISCC2018 Misc WriteUp

粘贴到博客里就自动变unicode编码了。可在这里转换http://tools.jb51.net/transcoding/chinese2unicode

\u0066\u006c\u0061\u0067\u007b\u0069\u0073\u0063\u0063\u0020\u0069\u0073\u0020\u0066\u0075\u006e\u007d 

unicode再转中文:

flag{iscc is fun} 

5.Where is the FLAG [分值:100]

题目描述:

不只是Logo
等待更新.........


6.凯撒十三世[分值:150]

题目描述:

凯撒十三世在学会使用键盘后,向你扔了一串字符:“ebdgc697g95w3”,猜猜它吧。

根据描述应该是凯撒密码。13世估计指的是次数,键盘应该是键盘加密。

http://www.zjslove.com/3.decode/kaisa/index.html 

第1次解密:ebdgc697g95w3
第2次解密:dacfb697f95v3
第3次解密:czbea697e95u3
第4次解密:byadz697d95t3
第5次解密:axzcy697c95s3
第6次解密:zwybx697b95r3
第7次解密:yvxaw697a95q3
第8次解密:xuwzv697z95p3
第9次解密:wtvyu697y95o3
第10次解密:vsuxt697x95n3
第11次解密:urtws697w95m3
第12次解密:tqsvr697v95l3
第13次解密:spruq697u95k3
第14次解密:roqtp697t95j3       flag:yougotme
第15次解密:qnpso697s95i3
第16次解密:pmorn697r95h3
第17次解密:olnqm697q95g3
第18次解密:nkmpl697p95f3
第19次解密:mjlok697o95e3    k
第20次解密:liknj697n95d3
第21次解密:khjmi697m95c3
第22次解密:jgilh697l95b3
第23次解密:ifhkg697k95a3
第24次解密:hegjf697j95z3
第25次解密:gdfie697i95y3
第26次解密:fcehd697h95x3
上边是第十四次,是因为第一次实际上是第0次,什么也没变。这里的键盘加密指的是
roqtp697t95j3
键盘上这些字母下方的字母。

7.一只猫的心思[分值:150]

题目描述:

你能读懂它的心思吗?

又是图片结尾有附加数据。提取之后是一个word文档,打开是一串佛系文字,同样在佛系网站解下:

ISCC2018 Misc WriteUp

文本前添加如是我闻:然后解密,一堆16进制字符串,打印出来是base64字符串,再解是base32的字符串。

import binascii
import base64

str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

de1=binascii.a2b_hex(str1)
print de1

de2=base64.b64decode(de1)

print de2

de3=base64.b32decode(de2)
print de3


de4=binascii.a2b_hex(de3)
print de4


de5=base64.b64decode(de4)
print de5


de6=base64.b32decode(de5)
print de6


de7=binascii.a2b_hex(de6)
print de7

来来回回7-8此 终于解出来一个短的:

F1a9_is_I5cc_ZOl8_G3TP01NT

然后就卡住了。。。。。。。。。。。。

原来 I5cc_ZOl8_G3TP01NT 这个是答案。还以为还有一层加密。


8.暴力XX不可取[分值:150]

题目描述:

A同学要去参加今年的ISCC。大赛在即,A同学准备了一批暴力**工具,你感觉这个靠谱吗?

下载下来是一个zip包,题目提示暴力**不可取。可能是zip伪加密。

https://blog.csdn.net/kajweb/article/details/76474476

参考上边的链接,把偏移0x3f 改为08 解出来txt
vfppjrnerpbzvat

提交之后不对,应该还有加密,试了下凯撒解密:
http://www.zjslove.com/3.decode/kaisa/index.html
凯撒解了一下:
第1次解密:vfppjrnerpbzvat
第2次解密:ueooiqmdqoayuzs
第3次解密:tdnnhplcpnzxtyr
第4次解密:scmmgokbomywsxq
第5次解密:rbllfnjanlxvrwp
第6次解密:qakkemizmkwuqvo
第7次解密:pzjjdlhyljvtpun
第8次解密:oyiickgxkiusotm
第9次解密:nxhhbjfwjhtrnsl
第10次解密:mwggaievigsqmrk
第11次解密:lvffzhduhfrplqj
第12次解密:kueeygctgeqokpi
第13次解密:jtddxfbsfdpnjoh
第14次解密:isccwearecoming         这个
第15次解密:hrbbvdzqdbnlhmf
第16次解密:gqaaucypcamkgle
第17次解密:fpzztbxobzljfkd
第18次解密:eoyysawnaykiejc
第19次解密:dnxxrzvmzxjhdib
第20次解密:cmwwqyulywigcha
第21次解密:blvvpxtkxvhfbgz
第22次解密:akuuowsjwugeafy
第23次解密:zjttnvrivtfdzex
第24次解密:yissmuqhusecydw
第25次解密:xhrrltpgtrdbxcv
第26次解密:wgqqksofsqcawbu

9.数字密文  [分值:50]

题目描述:

这里有个很简单的flag,藏在下面这串数字里,猜猜吧!69742773206561737921
16进制转字符串:
ISCC2018 Misc WriteUp

4.有趣的ISCC [分值:100]

题目描述:



4.有趣的ISCC [分值:100]

题目描述:



4.有趣的ISCC [分值:100]

题目描述:



4.有趣的ISCC [分值:100]

题目描述:




相关标签: ISCC 2018 WriteUp