misc1

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
# 文件末尾 zip 分离
# happy.rar -> 提取happy.zip -> 删除文件末尾 -> winrar压缩

# BKCRACK爆破 '/root/Desktop/bkcrack-1.5.0-Linux/bkcrack' -C '/root/Desktop/flag.zip' -c happy.png -P '/root/Desktop/happy.zip' -p happy.png

# BKCRACK修改密码
'/root/Desktop/bkcrack-1.5.0-Linux/bkcrack' -C '/root/Desktop/flag.zip' -k 72faa619 e1f67251 736a3b2b -U '/root/Desktop/out.zip' 123456

# flag.txt 中链接掩码爆破
import string
import requests

wordlist = string.digits + string.ascii_letters
for char1 in wordlist:
for char2 in wordlist:
url = f"http://124.221.18.25/f14gish{char1}re{char2}y.txt"
response = requests.post(url).text
if len(response) != 169:
print(url)
print(response)

# url:http://124.221.18.25/f14gish3reoy.txt

misc3

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
# 导出data数据
F:\WEB\Wireshark\tshark.exe -r C:\Users\HK\Desktop\attachment.pcap -T fields -e s7comm.resp.data -Y 'frame.len == 93' > C:\Users\HK\Desktop\out.txt

# 转换成原始数据
out = ''
lines = open(r"C:\Users\HK\Desktop\out.txt",encoding='utf-8').readlines()
for line in lines:
line = line.strip()
out += line

print(out)

# strings data
GFVWUV3WOFIUG3DPJB4DQ6TVO5ZUW3ZVOBKFCP3QO5SD2MJSGM2A====
1kjWvqQCloHx8zuwsKo5pTQ?pwd=1234

# 恢复成百度网盘链接
https://pan.baidu.com/s/1kjWvqQCloHx8zuwsKo5pTQ?pwd=1234

# reverse && from base64 得到压缩包

# 压缩包内 \_MACOSX\secret\._flag 包含了图片的源项目地址 https://piellardj.github.io/,使用项目中的解密器 https://piellardj.github.io/stereogram-solver/ 即可得到 flag.png 原图

image.png