misc112345678910111213141516171819202122# 文件末尾 zip 分离# happy.rar -> 提取happy.zip -> 删除文件末尾 -> winrar压缩# BKCRACK爆破 '/root/Desktop/bkcrack-1.5.0-Linux/bkcrack' -C '/root/Desktop/flag.zip' -c happy.png -P '/root/Desktop/happy.zip' -p happy.png# BKCRACK修改密码'/root/Desktop/bkcrack-1.5.0-Linux/bkcrack' -C '/root/Desktop/flag.zip' -k 72faa619 e1f67251 736a3b2b -U '/root/Desktop/out.zip' 123456# flag.txt 中链接掩码爆破import stringimport requestswordlist = string.digits + string.ascii_lettersfor char1 in wordlist: for char2 in wordlist: url = f"http://124.221.18.25/f14gish{char1}re{char2}y.txt" response = requests.post(url).text if len(response) != 169: print(url) print(response) # url:http://124.221.18.25/f14gish3reoy.txt misc312345678910111213141516171819202122# 导出data数据F:\WEB\Wireshark\tshark.exe -r C:\Users\HK\Desktop\attachment.pcap -T fields -e s7comm.resp.data -Y 'frame.len == 93' > C:\Users\HK\Desktop\out.txt# 转换成原始数据out = ''lines = open(r"C:\Users\HK\Desktop\out.txt",encoding='utf-8').readlines()for line in lines: line = line.strip() out += lineprint(out)# strings dataGFVWUV3WOFIUG3DPJB4DQ6TVO5ZUW3ZVOBKFCP3QO5SD2MJSGM2A====1kjWvqQCloHx8zuwsKo5pTQ?pwd=1234# 恢复成百度网盘链接https://pan.baidu.com/s/1kjWvqQCloHx8zuwsKo5pTQ?pwd=1234# reverse && from base64 得到压缩包# 压缩包内 \_MACOSX\secret\._flag 包含了图片的源项目地址 https://piellardj.github.io/,使用项目中的解密器 https://piellardj.github.io/stereogram-solver/ 即可得到 flag.png 原图