<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Wireshark on 知识带给我们自由</title>
    <link>https://yuexuan521.github.io/zh/tags/wireshark/</link>
    <description>Recent content in Wireshark on 知识带给我们自由</description>
    <image>
      <title>知识带给我们自由</title>
      <url>https://yuexuan521.github.io/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://yuexuan521.github.io/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.160.1</generator>
    <language>en-us</language>
    <copyright>See this site&amp;rsquo;s source code here, licensed under GPLv3 ·</copyright>
    <lastBuildDate>Mon, 07 Jul 2025 08:00:00 +0000</lastBuildDate>
    <atom:link href="https://yuexuan521.github.io/zh/tags/wireshark/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>BUUCTF [CFI-CTF 2018]webLogon capture 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-cfi-ctf-2018weblogon-capture-1/</link>
      <pubDate>Mon, 07 Jul 2025 08:00:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-cfi-ctf-2018weblogon-capture-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190856167.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190856167.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190858220.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190858220.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;得到的 flag 请包上 flag{} 提交。&lt;/p&gt;
&lt;h3 id=&#34;密文&#34;&gt;密文：&lt;/h3&gt;
&lt;p&gt;保存附件，解压得到tmp文件夹，内有logon.pcapng。&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190859752.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190859752.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;解题思路&#34;&gt;解题思路：&lt;/h3&gt;
&lt;p&gt;1、没想到这道题这么简单。双击logon.pcapng文件，在Wireshark中打开，流量很少。&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190856167.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190856167.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190858220.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190858220.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>得到的 flag 请包上 flag{} 提交。</p>
<h3 id="密文">密文：</h3>
<p>保存附件，解压得到tmp文件夹，内有logon.pcapng。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190859752.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190859752.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、没想到这道题这么简单。双击logon.pcapng文件，在Wireshark中打开，流量很少。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190901506.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190901506.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>直接追踪HTTP流，看一下内容。发现是登录流量，尝试登录三次，都失败了。但用户名和密码并没有变化，只是尝试登录了三次。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190903449.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190903449.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>登录所使用的 <code>password</code> ，使用URL编码。使用在线网站进行解码，得到flag： <code>CFI{1ns3cur3_l0g0n}</code> 。</p>
<p><a href="http://web.chacuo.net/charseturlencode"target="_blank" rel="noopener noreferrer">在线urlencode编码、urldecode解码、url编码解码、百分号编码</a></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">%20%43%46%49%7b%31%6e%73%33%63%75%72%33%5f%6c%30%67%30%6e%7d%20
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190906009.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190906009.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl"> flag<span class="o">{</span>1ns3cur3_l0g0n<span class="o">}</span> 
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF 大流量分析（三） 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-%E5%A4%A7%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E4%B8%89-1/</link>
      <pubDate>Mon, 12 May 2025 09:00:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-%E5%A4%A7%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E4%B8%89-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192841294.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192841294.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;
&lt;a href=&#34;https://www.cnblogs.com/yunqian2017/p/14298416.html&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;BUUCTF | 大流量分析 （一）（二）（三）&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192843830.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192843830.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;某黑客对A公司发动了攻击，以下是一段时间内我们获取到的流量包，那黑客预留的后门的文件名是什么？（答案加上flag{}）附件链接: &lt;a href=&#34;https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g&lt;/a&gt; 提取码: 9jva 注意：得到的 flag 请包上 flag{} 提交&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192841294.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192841294.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a>
<a href="https://www.cnblogs.com/yunqian2017/p/14298416.html"target="_blank" rel="noopener noreferrer">BUUCTF | 大流量分析 （一）（二）（三）</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192843830.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192843830.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>某黑客对A公司发动了攻击，以下是一段时间内我们获取到的流量包，那黑客预留的后门的文件名是什么？（答案加上flag{}）附件链接: <a href="https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g"target="_blank" rel="noopener noreferrer">https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g</a> 提取码: 9jva 注意：得到的 flag 请包上 flag{} 提交</p>
<h3 id="密文">密文：</h3>
<p>下载附件，有很多pcap流量包。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192846159.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192846159.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、寻找黑客留下的后门文件，对于php站点，通常成功上传木马后，会测试 <code>phpinfo()</code> 返回。</p>
<p>所以，在流量包中搜索 <code>phpinfo()</code> ，过滤语句如下：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-python" data-lang="python"><span class="line"><span class="cl"><span class="n">tcp</span> <span class="n">contains</span> <span class="s2">&#34;phpinfo()&#34;</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>最终，在该流量包 <code>数据采集D_eth0_NS_20160809_172831.pcap</code> 发现 <code>phpinfo()</code> 。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192848528.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192848528.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>执行 <code>phpinfo()</code> 的文件是admin.bak.php，黑客预留的后门的文件名是 <code>admin.bak.php</code> 。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192850193.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192850193.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-python" data-lang="python"><span class="line"><span class="cl"><span class="n">GET</span> <span class="o">/</span><span class="n">admin</span><span class="o">.</span><span class="n">bak</span><span class="o">.</span><span class="n">php</span><span class="err">?</span><span class="n">a</span><span class="o">=</span><span class="k">assert</span><span class="o">&amp;</span><span class="n">b</span><span class="o">=</span><span class="n">phpinfo</span><span class="p">()</span> <span class="n">HTTP</span><span class="o">/</span><span class="mf">1.1</span>\<span class="n">r</span>\<span class="n">n</span>
</span></span></code></pre></td></tr></table>
</div>
</div><h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>admin.bak.php<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF 大流量分析（二） 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-%E5%A4%A7%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E4%BA%8C-1/</link>
      <pubDate>Mon, 12 May 2025 08:30:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-%E5%A4%A7%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E4%BA%8C-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192851996.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192851996.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;
&lt;a href=&#34;https://blog.csdn.net/mochu7777777/article/details/110494041&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;BUUCTF：大流量分析（二）&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192854069.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192854069.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;黑客对A公司发动了攻击，以下是一段时间内获取到的流量包，那黑客使用了哪个邮箱给员工发送了钓鱼邮件?（答案加上flag{}）附件链接: &lt;a href=&#34;https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g&lt;/a&gt; 提取码: 9jva 注意：得到的 flag 请包上 flag{} 提交&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192851996.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192851996.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a>
<a href="https://blog.csdn.net/mochu7777777/article/details/110494041"target="_blank" rel="noopener noreferrer">BUUCTF：大流量分析（二）</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192854069.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192854069.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>黑客对A公司发动了攻击，以下是一段时间内获取到的流量包，那黑客使用了哪个邮箱给员工发送了钓鱼邮件?（答案加上flag{}）附件链接: <a href="https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g"target="_blank" rel="noopener noreferrer">https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g</a> 提取码: 9jva 注意：得到的 flag 请包上 flag{} 提交</p>
<h3 id="密文">密文：</h3>
<p>下载附件，有很多pcap流量包。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192856383.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192856383.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、看第一个流量包，钓鱼邮件一般出现在攻击前期，寻找SMTP流量。</p>
<blockquote>
<p>邮件协议：POP、SMTP、IMAP</p>
</blockquote>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192858934.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192858934.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>追踪TCP流，发现几个邮箱。（拥有同样后缀@t3sec.cc的邮箱，应该是公司员工的邮箱）</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192901470.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192901470.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>往下查看流量，发现一段Base64编码的数据。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192903711.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192903711.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>解码后，发现疑似钓鱼邮件，确认黑客使用的邮箱是： <code>xsser@live.cn</code> 。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-python" data-lang="python"><span class="line"><span class="cl"><span class="n">tPO80rrDoaMNCiAgICAgvPjT2rmry77N</span><span class="o">+</span><span class="n">MLnvNy5ubjEtq</span><span class="o">+</span><span class="n">jrLK</span><span class="o">/</span><span class="n">t9bTptPD0OjSqsn9vLajrL7J</span>
</span></span><span class="line"><span class="cl"><span class="n">sOaxvm1haWyhom9hoaJjcm21yM</span><span class="o">+</span><span class="mi">1</span><span class="n">zbPW8LK9vavM5ru7o6zH67TzvNK1x8K8aHR0cDovLzExOC4x</span>
</span></span><span class="line"><span class="cl"><span class="n">OTQuMTk2LjIzMjo4MDg0L2dldC5waHAgzO7QtNfUvLq1xNXKusXS1LHjxeS6z8</span><span class="o">+</span><span class="mi">1</span><span class="n">zbPJ</span><span class="o">/</span><span class="n">by2oaMN</span>
</span></span><span class="line"><span class="cl"><span class="n">CiAgICDQu9C7tPO80qOhDQoNCg</span><span class="o">==</span>
</span></span></code></pre></td></tr></table>
</div>
</div><div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-python" data-lang="python"><span class="line"><span class="cl"><span class="n">大家好</span><span class="err">。</span>
</span></span><span class="line"><span class="cl">     <span class="n">鉴于公司网络架构改动</span><span class="err">，</span><span class="n">部分应用需要升级</span><span class="err">，</span><span class="n">旧版本mail</span><span class="err">、</span><span class="n">oa</span><span class="err">、</span><span class="n">crm等系统逐步将替换</span><span class="err">，</span><span class="n">请大家登录http</span><span class="p">:</span><span class="o">//</span><span class="mf">118.194.196.232</span><span class="p">:</span><span class="mi">8084</span><span class="o">/</span><span class="n">get</span><span class="o">.</span><span class="n">php</span> <span class="n">填写自己的帐号以便配合系统升级</span><span class="err">。</span>
</span></span><span class="line"><span class="cl">    <span class="n">谢谢大家</span><span class="err">！</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192905527.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192905527.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>xsser@live.cn<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF 大流量分析（一） 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-%E5%A4%A7%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E4%B8%80-1/</link>
      <pubDate>Mon, 05 May 2025 08:30:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-%E5%A4%A7%E6%B5%81%E9%87%8F%E5%88%86%E6%9E%90%E4%B8%80-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192825456.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192825456.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;
&lt;a href=&#34;https://blog.csdn.net/wangjin7356/article/details/122525900&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;BUUCTF:大流量分析（一）&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192827137.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192827137.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;某黑客对A公司发动了攻击，以下是一段时间内我们获取到的流量包，那黑客的攻击ip是多少？（答案加上flag{}）附件链接: &lt;a href=&#34;https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g&lt;/a&gt; 提取码: 9jva 注意：得到的 flag 请包上 flag{} 提交&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192825456.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192825456.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a>
<a href="https://blog.csdn.net/wangjin7356/article/details/122525900"target="_blank" rel="noopener noreferrer">BUUCTF:大流量分析（一）</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192827137.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192827137.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>某黑客对A公司发动了攻击，以下是一段时间内我们获取到的流量包，那黑客的攻击ip是多少？（答案加上flag{}）附件链接: <a href="https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g"target="_blank" rel="noopener noreferrer">https://pan.baidu.com/s/1EgLI37y6m9btzwIWZYDL9g</a> 提取码: 9jva 注意：得到的 flag 请包上 flag{} 提交</p>
<h3 id="密文">密文：</h3>
<p>下载附件，有很多pcap流量包</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192828717.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192828717.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、随便打开一个，一般黑客的攻击流量会很多，需要使用Wireshark统计功能。</p>
<p>先统计IP，统计 → IPv4 Statistics → All Addresses</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192830566.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192830566.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>将IP出现数量Count进行排序，发现除了 <code>183.129.152.140</code> ，其它全部是内网IP。</p>
<blockquote>
<p>常见内网IP段：
10.0.0.0 – 10.255.255.255
172.16.0.0 – 172.31.255.255
192.168.0.0 – 192.168.255.255</p>
</blockquote>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192833055.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192833055.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>2、统计会话和端点，发现 <code>183.129.152.140</code> 的分组数，是除内网IP最多的。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192835290.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192835290.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>会话</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192837106.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192837106.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>端点</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192839423.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192839423.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>最后，确认黑客的攻击ip是 <code>183.129.152.140</code> 。</p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>183.129.152.140<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF greatescape 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-greatescape-1/</link>
      <pubDate>Mon, 31 Mar 2025 08:30:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-greatescape-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185851554.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185851554.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;
&lt;a href=&#34;https://hello-ctf.com/HC_Start/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Hello CTF&lt;/a&gt;
&lt;a href=&#34;https://ns.openctf.net/learn/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;NewStar CTF&lt;/a&gt;
&lt;a href=&#34;https://blog.csdn.net/weixin_66146598/article/details/125131129&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;[BUUCTF] greatescape解析&lt;/a&gt;
&lt;a href=&#34;https://blog.51cto.com/u_16159500/6515299&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;BUUCTF：greatescape&lt;/a&gt;
&lt;a href=&#34;https://blog.csdn.net/chinese_cabbage0/article/details/144456714&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;buuctf-greatescape题目解析&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185851554.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185851554.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a>
<a href="https://hello-ctf.com/HC_Start/"target="_blank" rel="noopener noreferrer">Hello CTF</a>
<a href="https://ns.openctf.net/learn/"target="_blank" rel="noopener noreferrer">NewStar CTF</a>
<a href="https://blog.csdn.net/weixin_66146598/article/details/125131129"target="_blank" rel="noopener noreferrer">[BUUCTF] greatescape解析</a>
<a href="https://blog.51cto.com/u_16159500/6515299"target="_blank" rel="noopener noreferrer">BUUCTF：greatescape</a>
<a href="https://blog.csdn.net/chinese_cabbage0/article/details/144456714"target="_blank" rel="noopener noreferrer">buuctf-greatescape题目解析</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185853673.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185853673.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>注意：得到的 flag 请包上 flag{} 提交</p>
<h3 id="密文">密文：</h3>
<p>下载附件，解压得到 <code>greatescape.pcap</code></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185855078.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185855078.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、过滤常见协议，如FTP、HTTP。在FTP协议中，查看TCP流，发现ssc.key文件，猜测为TLS密钥文件。（位置在 <code>tcp.stream eq 18</code> ）</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185856071.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185856071.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185857870.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185857870.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>在 <code>tcp.stream eq 19</code> ，可以找到ssc.key密钥文件数据，另存为ssc.key文件。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span><span class="lnt">13
</span><span class="lnt">14
</span><span class="lnt">15
</span><span class="lnt">16
</span><span class="lnt">17
</span><span class="lnt">18
</span><span class="lnt">19
</span><span class="lnt">20
</span><span class="lnt">21
</span><span class="lnt">22
</span><span class="lnt">23
</span><span class="lnt">24
</span><span class="lnt">25
</span><span class="lnt">26
</span><span class="lnt">27
</span><span class="lnt">28
</span><span class="lnt">29
</span><span class="lnt">30
</span><span class="lnt">31
</span><span class="lnt">32
</span><span class="lnt">33
</span><span class="lnt">34
</span><span class="lnt">35
</span><span class="lnt">36
</span><span class="lnt">37
</span><span class="lnt">38
</span><span class="lnt">39
</span><span class="lnt">40
</span><span class="lnt">41
</span><span class="lnt">42
</span><span class="lnt">43
</span><span class="lnt">44
</span><span class="lnt">45
</span><span class="lnt">46
</span><span class="lnt">47
</span><span class="lnt">48
</span><span class="lnt">49
</span><span class="lnt">50
</span><span class="lnt">51
</span><span class="lnt">52
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-python" data-lang="python"><span class="line"><span class="cl"><span class="o">-----</span><span class="n">BEGIN</span> <span class="n">PRIVATE</span> <span class="n">KEY</span><span class="o">-----</span>
</span></span><span class="line"><span class="cl"><span class="n">MIIJQwIBADANBgkqhkiG9w0BAQEFAASCCS0wggkpAgEAAoICAQC5twyPH</span><span class="o">+</span><span class="mi">2</span><span class="n">U6X0Q</span>
</span></span><span class="line"><span class="cl"><span class="n">uxOKPTHSR6MkXGSvAz</span><span class="o">+</span><span class="n">Ax</span><span class="o">+</span><span class="n">G9DKEiBLuTTfl7dNv4oswdmT9nWlSY1kxZatNwlUF8</span>
</span></span><span class="line"><span class="cl"><span class="n">WAuGLntO5xTEmOJlMtBFrWGD</span><span class="o">+</span><span class="n">DVpCE9KORGvyif8e4xxi6vh4mkW78IxV03VxHM0</span>
</span></span><span class="line"><span class="cl"><span class="n">mk</span><span class="o">/</span><span class="n">cq5kkERfWQW81pVeYm9UAm4dj</span><span class="o">+</span><span class="n">LcCwQ9aGd</span><span class="o">/</span><span class="n">vfTtcACqS5OGtELFbsHJuFVyn</span>
</span></span><span class="line"><span class="cl"><span class="n">srpp4K6tLtRk2ensSnmXUXNEjqpodfdb</span><span class="o">/</span><span class="n">wqGT86NYg7i6d</span><span class="o">/</span><span class="mi">4</span><span class="n">Rqa440a6BD7RKrgp</span>
</span></span><span class="line"><span class="cl"><span class="n">YPaXl7pQusemHQPd248fxsuEfEwhPNDJhIb8fDX9BWv2xTfBLhGwOh7euzSh2C4o</span>
</span></span><span class="line"><span class="cl"><span class="n">KSuBAO</span><span class="o">+</span><span class="n">bIkL</span><span class="o">+</span><span class="n">pGY1z7DFtuJYfTOSJyQ5zQzToxS</span><span class="o">+</span><span class="n">jE</span><span class="o">+</span><span class="mi">2</span><span class="n">x9</span><span class="o">/</span><span class="mi">3</span><span class="n">GpD2LUD0xkA8bWhv</span>
</span></span><span class="line"><span class="cl"><span class="n">eecq0v6ZWBVYNX54V5ME3s2qxYc6CSQhi6Moy8xWlcSpTSAa7voNQNa9RvQ4</span><span class="o">/</span><span class="mi">3</span><span class="n">KF</span>
</span></span><span class="line"><span class="cl"><span class="mi">3</span><span class="n">gCbKtFvdd7IHvxfn8vcCrCZ37eVkq0Fl1y5UNeJU</span><span class="o">/</span><span class="n">Y0Tt8m7UDn3uKNpB841BQa</span>
</span></span><span class="line"><span class="cl"><span class="n">hiGayCSjsHuTS8B</span><span class="o">+</span><span class="n">MnpnzWCrzD</span><span class="o">+</span><span class="n">rAzCB37B599iBK4t</span><span class="o">/</span><span class="n">mwSIZZUZaqxTWNoFS2Lz</span>
</span></span><span class="line"><span class="cl"><span class="mi">7</span><span class="n">m0LumZ4Yk8DpDEuWhNs8OUD8FsgAvWFVAvivaaAciF3kMs8pkmNTs2LFBowOshz</span>
</span></span><span class="line"><span class="cl"><span class="n">SXfONsHupgXEwwFrKOOZXNhb</span><span class="o">+</span><span class="n">O</span><span class="o">/</span><span class="n">WKQIDAQABAoICAAT6mFaZ94efft</span><span class="o">/</span><span class="n">c9BgnrddC</span>
</span></span><span class="line"><span class="cl"><span class="n">XmhSJczfXGt6cF3eIc</span><span class="o">/</span><span class="n">Eqra3R3H83wzaaHh</span><span class="o">+</span><span class="n">rEl8DXqPfDqFd6e0CK5pud1eD6Y8</span>
</span></span><span class="line"><span class="cl"><span class="mi">4</span><span class="n">bynkKI</span><span class="o">/</span><span class="mi">63</span><span class="o">+</span><span class="n">Ct3OPSvdG5sFJqGS7GblWIpzErtX</span><span class="o">+</span><span class="n">eOzJfr5N5eNOQfxuCqgS3acu</span>
</span></span><span class="line"><span class="cl"><span class="mi">4</span><span class="n">iG3XWDlzuRjgSFkCgwvFdD4Fg5HVU6ZX</span><span class="o">+</span><span class="n">cGhh2sDzTRlr</span><span class="o">+</span><span class="n">rilXTMsm4K</span><span class="o">/</span><span class="n">E8udIg</span>
</span></span><span class="line"><span class="cl"><span class="n">yEbv5KqWEI5y</span><span class="o">+</span><span class="mi">5</span><span class="n">Eh9gWY7AnGW6TgLNxzfYyt0nhYhI2</span><span class="o">+</span><span class="n">Yh4IkRqQd6F8XQARbEhP</span>
</span></span><span class="line"><span class="cl"><span class="n">yZx1eK4Q</span><span class="o">/</span><span class="n">dRPQxOJNY1KkRpl</span><span class="o">+</span><span class="n">Cx6tAPVimByRx1hu82qsTstb6rLHemruOPbf5Dw</span>
</span></span><span class="line"><span class="cl"><span class="n">aqgSFdp7it3uqjJHCwJ2hAZoijAcvlhn1sa1hr</span><span class="o">/</span><span class="n">qFFlY</span><span class="o">/</span><span class="n">WeDAi8OyvGdCSh3OvS6</span>
</span></span><span class="line"><span class="cl"><span class="n">yazkah85GOnY85rz</span><span class="o">+</span><span class="n">s98F9cvIqcRdGJrAeNbUHHnj6</span><span class="o">+</span><span class="n">X9qFVtwDpF0V1vlvn2Ggp</span>
</span></span><span class="line"><span class="cl"><span class="mi">7</span><span class="n">m8hiZ0Y</span><span class="o">+</span><span class="mi">8</span><span class="n">T</span><span class="o">+</span><span class="mi">7</span><span class="n">qfnS9WsdPh7MkoIEoZ0CPryYvX</span><span class="o">+</span><span class="n">YPLYWqzxtCvrRWF8tAScI6H</span><span class="o">+</span>
</span></span><span class="line"><span class="cl"><span class="n">XBz3NlCAUaOk</span><span class="o">+</span><span class="n">ZOkKlZ8ZYMSn</span><span class="o">/</span><span class="n">g5EV2jj</span><span class="o">/</span><span class="n">mwZVdtYoeQjLaCDuLq8E1Hswnpgq7F</span>
</span></span><span class="line"><span class="cl"><span class="mi">54</span><span class="n">hHU7vOeJ1</span><span class="o">/</span><span class="n">TQltLCNfJFQRaUD</span><span class="o">+</span><span class="n">tPz9R6jVpbqBiXxIC2eiGTo1rP4Ii7hsQRFC</span>
</span></span><span class="line"><span class="cl"><span class="n">W0KKqu</span><span class="o">+</span><span class="n">bV69HJAmi06yBAoIBAQDvz</span><span class="o">+</span><span class="n">c</span><span class="o">+</span><span class="mi">3</span><span class="n">z9njQFFaeUUqyzl31HOzRHmWhJEoriR</span>
</span></span><span class="line"><span class="cl"><span class="n">nRhWTLzqMyn</span><span class="o">+</span><span class="n">RLGrD3DJQj</span><span class="o">/</span><span class="n">dGH6tyxHJ7PdI7gtJ3qaF4lCc2dKR3uQW3CBKI9Ys</span>
</span></span><span class="line"><span class="cl"><span class="n">wzjBWOTijafbttXHanXEwXR3vnPk</span><span class="o">+</span><span class="n">sH52BqTXZQVA5vzPwIPJnz3H6E9hL66b</span><span class="o">/</span><span class="n">uM</span>
</span></span><span class="line"><span class="cl"><span class="n">DS9owYRBmykXlV9Gt91Vl5cpg3yxPixaeLMhqDD2Ebq6OFyuacExQHfGUeP0Va</span><span class="o">/</span><span class="n">A</span>
</span></span><span class="line"><span class="cl"><span class="n">IdM9</span><span class="o">+</span><span class="n">H5DE13qR2INX</span><span class="o">+</span><span class="n">N0kAFyFzW7k8AvY37KGZdoACUrDzmmGoilfs</span><span class="o">/</span><span class="n">pFAC0kZaZ</span>
</span></span><span class="line"><span class="cl"><span class="n">tKXoR9iLNxWSBtlI2Fr3qz4gc5nItYb7JSQsdu6Lc92</span><span class="o">+</span><span class="mi">9</span><span class="n">z4xAoIBAQDGQFDXVQyk</span>
</span></span><span class="line"><span class="cl"><span class="n">Q5tsWicru5v2c9VoFpLUtBg4Dx3uXOMEVl</span><span class="o">/</span><span class="n">S5hZ8jYbUH4dcwKyLCYQLtNSc9aei</span>
</span></span><span class="line"><span class="cl"><span class="mi">8</span><span class="n">zm18TdOGm0nCLOo7OPMeet</span><span class="o">+</span><span class="n">JHyx8uz1l</span><span class="o">/</span><span class="n">Sx4ucI</span><span class="o">/</span><span class="n">Jq3yVSTqdtXYakxzijTldNQ</span>
</span></span><span class="line"><span class="cl"><span class="n">M7YnjpBcs0yDk806R7J3xvxZNMbElQH1bP947Ej0sv40cBcA0hdpjuuNI5C2Ot4P</span>
</span></span><span class="line"><span class="cl"><span class="n">fUZXfqR34L7aPZPuP82W2WqFgkTyMY8FO235qR</span><span class="o">+</span><span class="n">Sy5xrcHSS4L1FdF</span><span class="o">+</span><span class="n">PhS5ZjiPN</span>
</span></span><span class="line"><span class="cl"><span class="n">sUdXRvfNFQlKZRUyqB147XY7EDnx6BZW2aoM7AiYPiGhxZeV4NHy1ChdBO2CSmOA</span>
</span></span><span class="line"><span class="cl"><span class="mi">03</span><span class="n">FvucMEmUF5AoIBAD2xorAOBuXA5L7Sy1hR4S8SEJ2</span><span class="o">/</span><span class="n">LAeyzFhT9F</span><span class="o">+</span><span class="n">hpo0tGLy3</span>
</span></span><span class="line"><span class="cl"><span class="n">hOohCgQT6NQd8wgSMSTMxTrJd6SPeN</span><span class="o">/</span><span class="mi">8</span><span class="n">I6L14f84Gm</span><span class="o">/</span><span class="n">kg5FN</span><span class="o">+</span><span class="n">BCav5KsdoFnORr</span><span class="o">/</span>
</span></span><span class="line"><span class="cl"><span class="n">jlt74et3e</span><span class="o">+</span><span class="n">yuSCQ2HuKdkCGScuPOgzYUw54Ea6cyI5v</span><span class="o">/</span><span class="n">yx9kcxzLik8xZSzx</span><span class="o">+/</span><span class="n">BU</span>
</span></span><span class="line"><span class="cl"><span class="mi">1</span><span class="n">nF2wBgVXR</span><span class="o">+</span><span class="n">T7BOF</span><span class="o">/</span><span class="n">CIs</span><span class="o">+</span><span class="n">IQd4RebiV0EmqElttI36rec</span><span class="o">+</span><span class="n">jNPBfHpyVkIWqvqrbDb</span>
</span></span><span class="line"><span class="cl"><span class="mi">3</span><span class="n">qFS0</span><span class="o">+</span><span class="n">rU7FMkaPrM9cnX7O1ED242vzjGMMmvFQmicd0BjsNLnhLWEYRhcP0c3pyS</span>
</span></span><span class="line"><span class="cl"><span class="n">Az6Z</span><span class="o">/</span><span class="n">HQ9FMn6h</span><span class="o">/</span><span class="n">UZSErWSG970p6NyjieCkICoUECggEBALdyXhvTPD5nvNL3XRWv</span>
</span></span><span class="line"><span class="cl"><span class="n">pXLY3plRgg7Gkz6UZmrhksO5tTOu6xHX1</span><span class="o">/</span><span class="n">JDNntSYpbJeGFos</span><span class="o">/</span><span class="n">CFs9gp3rYH</span><span class="o">/</span><span class="n">dgM</span>
</span></span><span class="line"><span class="cl"><span class="n">xgH</span><span class="o">/</span><span class="n">oFdo1KWqD4oK80OqeTAMq0VLo</span><span class="o">+</span><span class="n">OB8xyrdNKqsydZXDmU</span><span class="o">/</span><span class="n">dxD4GRvZVeXKOhO</span>
</span></span><span class="line"><span class="cl"><span class="n">lTePtbD</span><span class="o">/</span><span class="n">FRqWi310Q5U2GLjkYkWfxyZ</span><span class="o">+</span><span class="mi">1</span><span class="n">pDpQ6</span><span class="o">/</span><span class="n">jt</span><span class="o">/</span><span class="n">xaXoacaVTmhgKpNkTSEBhJ</span>
</span></span><span class="line"><span class="cl"><span class="n">Y</span><span class="o">/</span><span class="n">EIV</span><span class="o">/</span><span class="n">F3IqM6jcH6uBewWhpKUspZf7jTJeuZBJXA1gMF20MvxqLhzymPqGcPaU9g</span>
</span></span><span class="line"><span class="cl"><span class="mi">7</span><span class="n">tbjUEkunQ8AFI40xpmc28cD5MHOS2ms3GwYLdtnTH65aJwiajBM62QSw</span><span class="o">/</span><span class="mi">3</span><span class="n">RU67W</span>
</span></span><span class="line"><span class="cl"><span class="n">rWkCggEBAOtMBi9ko4ZR96BCFcuyPsiMcoDBQBEFgH</span><span class="o">/</span><span class="n">drT3hMlwmmVt5dcInw3Zk</span>
</span></span><span class="line"><span class="cl"><span class="n">DQb3gIWHP1Ul</span><span class="o">//</span><span class="n">Ma8qwSeuIua0</span><span class="o">+</span><span class="mi">6</span><span class="n">wkQ3NcsDywlJ2cqfZUe7kVJTCl8fuudTAYqT</span>
</span></span><span class="line"><span class="cl"><span class="n">Bs5Y1ktYPSyQOxmidMeX5IcGe5fPSdpFu9wMXXQ31l8o9SzccFKwz1P1o8G00xvx</span>
</span></span><span class="line"><span class="cl"><span class="n">wtcfAZ204Dcrdfm6xTWmzMrHqngS1uUDOJbW175gQqeAszy8wLMz41Yau3ypk3ga</span>
</span></span><span class="line"><span class="cl"><span class="n">edWr4Hzbiph0V1Dv</span><span class="o">/</span><span class="n">V</span><span class="o">+</span><span class="n">kmmreWBmHetH6bhrTWQq3UZ5WbGMpiTmSsD0EXU5vZLbX</span>
</span></span><span class="line"><span class="cl"><span class="n">xmZSEXjNvG9grjxwR96vp1PK</span><span class="o">/</span><span class="mi">4</span><span class="n">Bq1jo</span><span class="o">=</span>
</span></span><span class="line"><span class="cl"><span class="o">-----</span><span class="n">END</span> <span class="n">PRIVATE</span> <span class="n">KEY</span><span class="o">-----</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185859533.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185859533.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185902069.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185902069.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>2、在Wireshark中，通过“编辑 &gt; 首选项 &gt; Protocols &gt; TLS”，点击“Edit”后添加Key File并输入ssc.key，最后确认即可完成TLS协议解密。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185904153.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185904153.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>使用如下过滤语句，即可得到flag： <code>INS{OkThatWasWay2Easy}</code></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-python" data-lang="python"><span class="line"><span class="cl"><span class="n">http</span> <span class="n">contains</span> <span class="s2">&#34;FLAG&#34;</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185906018.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228185906018.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>OkThatWasWay2Easy<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF [安洵杯 2019]Attack 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-%E5%AE%89%E6%B4%B5%E6%9D%AF-2019attack-1/</link>
      <pubDate>Mon, 30 Dec 2024 08:45:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-%E5%AE%89%E6%B4%B5%E6%9D%AF-2019attack-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192325019.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192325019.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;
&lt;a href=&#34;https://hello-ctf.com/HC_Start/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Hello CTF&lt;/a&gt;
&lt;a href=&#34;https://ns.openctf.net/learn/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;NewStar CTF&lt;/a&gt;
&lt;a href=&#34;https://xz.aliyun.com/t/6911?time__1311=n4%2bxnD0DgDuAG=DOzNDsA3xCTWk8DcAgBmoD&amp;amp;u_atoken=125653dce1d42cc643b337d1c883f99f&amp;amp;u_asig=0a472f9017274948088853311e0043#toc-24&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;安洵杯2019 官方Writeup(Web/Misc) - D0g3&lt;/a&gt;
&lt;a href=&#34;https://blog.csdn.net/weixin_66146598/article/details/125129282&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;[安洵杯 2019]Attack （详细解析）&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192325019.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192325019.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a>
<a href="https://hello-ctf.com/HC_Start/"target="_blank" rel="noopener noreferrer">Hello CTF</a>
<a href="https://ns.openctf.net/learn/"target="_blank" rel="noopener noreferrer">NewStar CTF</a>
<a href="https://xz.aliyun.com/t/6911?time__1311=n4%2bxnD0DgDuAG=DOzNDsA3xCTWk8DcAgBmoD&amp;u_atoken=125653dce1d42cc643b337d1c883f99f&amp;u_asig=0a472f9017274948088853311e0043#toc-24"target="_blank" rel="noopener noreferrer">安洵杯2019 官方Writeup(Web/Misc) - D0g3</a>
<a href="https://blog.csdn.net/weixin_66146598/article/details/125129282"target="_blank" rel="noopener noreferrer">[安洵杯 2019]Attack （详细解析）</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192327104.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192327104.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>得到的 flag 请包上 flag{} 提交。</p>
<h3 id="密文">密文：</h3>
<p>下载附件解压，得到Attack.pcap文件</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192329001.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192329001.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、打开流量包，根据题目提示，寻找攻击流量。首先，发现攻击者进行了目录扫描，在靠后位置发现上传一句话木马</p>
<p><strong>目录扫描</strong></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192330113.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192330113.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>上传一句话木马</strong></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192332602.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192332602.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192334567.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192334567.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>往下分析，发现一组TCP流量疑似执行命令，请求流量经过base64混淆，返回流量使用ROT13加密</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192337801.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192337801.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>继续分析其他TCP流，发现目录下多出一个s3cret.zip文件。(据说，可以通过文件大小异常，推测文件中包含其他文件，使用foremost分离文件)</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192339966.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192339966.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192341804.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192341804.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>在下一组流量中，找到zip压缩包的“PK”文件头，以及一个flag.txt文件</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192343482.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192343482.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>2、将以“50 4B 03 04”开头的zip文件数据，拿出来保存为zip文件</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192345626.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192345626.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192348223.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192348223.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>尝试解压，发现需要密码。根据压缩包hint提示，密码可能与administrator用户有关</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192350434.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192350434.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>继续分析流量，发现使用了procdump.exe这个工具，产生lsass.dmp文件</p>
<blockquote>
<p>Procdump工具一般用来抓取windows的lsass进程中的用户明文密码
lsass是windows系统的一个进程，用于本地安全和登陆策略。</p>
</blockquote>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192352711.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192352711.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>接下来，攻击者下载了lsass.dmp文件</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192354293.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192354293.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>我们将lsass.dmp文件下载下来</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192356375.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192356375.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<blockquote>
<p>Mimikatz 是一款功能强大的轻量级调试神器，通过它你可以提升进程权限注入进程读取进程内存，当然他最大的亮点就是他可以直接从 lsass.exe 进程中获取当前登录系统用户名的密码， lsass是微软Windows系统的安全机制它主要用于本地安全和登陆策略，通常我们在登陆系统时输入密码之后，密码便会储存在 lsass内存中，经过其 wdigest 和 tspkg 两个模块调用后，对其使用可逆的算法进行加密并存储在内存之中， 而 mimikatz 正是通过对lsass逆算获取到明文密码！也就是说只要你不重启电脑，就可以通过他获取到登陆密码，只限当前登陆系统！</p>
</blockquote>
<p>使用mimikatz获得该文件中administrator的密码，得到 <code>W3lc0meToD0g3</code>
mimikatz下载地址： <a href="https://github.com/gentilkiwi/mimikatz/"target="_blank" rel="noopener noreferrer">https://github.com/gentilkiwi/mimikatz/</a></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">将lsass.dmp文件放到mimikatz.exe下目录
</span></span><span class="line"><span class="cl">privilege::debug
</span></span><span class="line"><span class="cl">sekurlsa::minidump lsass.dmp
</span></span><span class="line"><span class="cl">sekurlsa::logonpasswords full
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192358227.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192358227.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>3、使用密码解压压缩包，得到flag.txt文件。（flag在文件底部，向下翻翻）</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192400016.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192400016.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">D0g3<span class="o">{</span>3466b11de8894198af3636c5bd1efce2<span class="o">}</span>
</span></span><span class="line"><span class="cl">flag<span class="o">{</span>3466b11de8894198af3636c5bd1efce2<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF [SUCTF2018]followme 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-suctf2018followme-1/</link>
      <pubDate>Mon, 16 Dec 2024 09:00:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-suctf2018followme-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191840322.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191840322.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;
&lt;a href=&#34;https://hello-ctf.com/HC_Start/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Hello CTF&lt;/a&gt;
&lt;a href=&#34;https://ns.openctf.net/learn/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;NewStar CTF&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191842332.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191842332.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;得到的 flag 请包上 flag{} 提交。来源： &lt;a href=&#34;https://github.com/hebtuerror404/CTF_competition_warehouse_2018&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://github.com/hebtuerror404/CTF_competition_warehouse_2018&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;密文&#34;&gt;密文：&lt;/h3&gt;
&lt;p&gt;下载附件得到attachment.pcapng文件&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191844026.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191844026.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;解题思路&#34;&gt;解题思路：&lt;/h3&gt;
&lt;p&gt;1、有两种方法，先讲讲我的解题经过。我首先简单浏览了一下流量，发现有大量HTTP流量，并且似乎存在爆破行为。过滤出HTTP流量，查看到爆破密码的步骤，随便看一个就捡到了flag。&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191840322.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191840322.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a>
<a href="https://hello-ctf.com/HC_Start/"target="_blank" rel="noopener noreferrer">Hello CTF</a>
<a href="https://ns.openctf.net/learn/"target="_blank" rel="noopener noreferrer">NewStar CTF</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191842332.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191842332.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>得到的 flag 请包上 flag{} 提交。来源： <a href="https://github.com/hebtuerror404/CTF_competition_warehouse_2018"target="_blank" rel="noopener noreferrer">https://github.com/hebtuerror404/CTF_competition_warehouse_2018</a></p>
<h3 id="密文">密文：</h3>
<p>下载附件得到attachment.pcapng文件</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191844026.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191844026.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、有两种方法，先讲讲我的解题经过。我首先简单浏览了一下流量，发现有大量HTTP流量，并且似乎存在爆破行为。过滤出HTTP流量，查看到爆破密码的步骤，随便看一个就捡到了flag。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191845264.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191845264.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h4 id="方法一">方法一：</h4>
<p>使用Wireshark，在分组字节流中查找包含 <code>ctf</code> 的内容，可以找到flag</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191847456.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191847456.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h4 id="方法二">方法二：</h4>
<p>将全部HTTP对象导出</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191849628.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191849628.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>发现大量的文件如下：</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191851559.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191851559.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>搜索文件中的关键词，使用grep命令，查找到flag</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">grep -r -i  <span class="s2">&#34;ctf&#34;</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191853095.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228191853095.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">SUCTF<span class="o">{</span>password_is_not_weak<span class="o">}</span>
</span></span><span class="line"><span class="cl">flag<span class="o">{</span>password_is_not_weak<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF 百里挑一 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-%E7%99%BE%E9%87%8C%E6%8C%91%E4%B8%80-1/</link>
      <pubDate>Mon, 16 Dec 2024 07:30:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-%E7%99%BE%E9%87%8C%E6%8C%91%E4%B8%80-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193134440.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193134440.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;
&lt;a href=&#34;https://hello-ctf.com/HC_Start/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;Hello CTF&lt;/a&gt;
&lt;a href=&#34;https://ns.openctf.net/learn/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;NewStar CTF&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193136490.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193136490.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;好多漂亮的壁纸，赶快挑一张吧！ 注意：得到的 flag 请包上 flag{} 提交&lt;/p&gt;
&lt;h3 id=&#34;密文&#34;&gt;密文：&lt;/h3&gt;
&lt;p&gt;下载附件解压，得到pacap流量文件&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193138130.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193138130.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id=&#34;解题思路&#34;&gt;解题思路：&lt;/h3&gt;
&lt;p&gt;1、双击打开文件，简单浏览发现存在大量的图片，将全部图片导出分析&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193134440.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193134440.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a>
<a href="https://hello-ctf.com/HC_Start/"target="_blank" rel="noopener noreferrer">Hello CTF</a>
<a href="https://ns.openctf.net/learn/"target="_blank" rel="noopener noreferrer">NewStar CTF</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193136490.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193136490.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>好多漂亮的壁纸，赶快挑一张吧！ 注意：得到的 flag 请包上 flag{} 提交</p>
<h3 id="密文">密文：</h3>
<p>下载附件解压，得到pacap流量文件</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193138130.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193138130.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、双击打开文件，简单浏览发现存在大量的图片，将全部图片导出分析</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193139593.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193139593.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>得到的图片如下：</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193141386.jpeg">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193141386.jpeg" 
             alt="请添加图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193143006.jpeg">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193143006.jpeg" 
             alt="请添加图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193144782.jpeg">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193144782.jpeg" 
             alt="请添加图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193146178.jpeg">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193146178.jpeg" 
             alt="请添加图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193147584.jpeg">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193147584.jpeg" 
             alt="请添加图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193149409.jpeg">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193149409.jpeg" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>简单看了几张，没有什么有用的信息</p>
<p>2、使用Kali上的exiftool工具，批量分析图片，寻找flag</p>
<blockquote>
<p>ExifTool是一款免费开源的图像信息查看工具，一个命令行应用程序。可用于读写和编辑图像（主要）、音视频和PDF等文件的元数据（metadata）。元数据是由一系列参数（下文为了与命令行参数做区别将称为标签）组成，如快门速度、光圈、白平衡、相机品牌和型号、镜头、焦距等等。而ExifTool可以帮助用户读取和处理这些数据， 支持许多不同的元数据格式，包括 EXIF，GPS，IPTC，XMP，JFIF，GeoTIFF，ICC 配置文件等等。支持多种输出格式设置选项（包括制表符分隔，HTML，XML 和 JSON），还可以多语言输出（cs，de，en，en-ca，en-gb，es，fi，fr，it，ja，ko，nl，pl，ru，sv，tr，zh-cn 或 zh-tw）。可以读取和写入许多数码相机的制造商说明。</p>
</blockquote>
<p>得到一半的flag， <code>flag{ae58d0408e26e8f</code></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-shell" data-lang="shell"><span class="line"><span class="cl">exiftool * <span class="p">|</span> grep flag
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193150869.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193150869.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>这一步可以使用其他的方法，按字符串分组字节流方式查找flag，也可以找到前半部分flag。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193152693.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193152693.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>3、经过以上的解题过程，猜测接下来的后半部分flag，也与exif信息有关。</p>
<blockquote>
<p>EXIF信息，是可交换图像文件的缩写，是专门为数码相机的照片设定的，可以记录数码照片的属性信息和拍摄数据。EXIF可以附加于JPEG、TIFF、RIFF等文件之中，为其增加有关数码相机拍摄信息的内容和索引图或图像处理软件的版本信息。</p>
</blockquote>
<p>回到Wireshark，查找exif字符，追踪TCP流，就可以找到后半部分flag。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193154758.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193154758.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193156836.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193156836.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>ae58d0408e26e8f26a3c0589d23edeec<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF 被嗅探的流量 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-%E8%A2%AB%E5%97%85%E6%8E%A2%E7%9A%84%E6%B5%81%E9%87%8F-1/</link>
      <pubDate>Tue, 24 Sep 2024 22:49:00 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-%E8%A2%AB%E5%97%85%E6%8E%A2%E7%9A%84%E6%B5%81%E9%87%8F-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193502458.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193502458.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193504562.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193504562.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;某黑客潜入到某公司内网通过嗅探抓取了一段文件传输的数据，该数据也被该公司截获，你能帮该公司分析他抓取的到底是什么文件的数据吗？&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193502458.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193502458.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193504562.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193504562.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>某黑客潜入到某公司内网通过嗅探抓取了一段文件传输的数据，该数据也被该公司截获，你能帮该公司分析他抓取的到底是什么文件的数据吗？</p>
<h3 id="密文">密文：</h3>
<p>下载附件，解压得到一个.pcapng文件。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193506954.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193506954.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="解题思路">解题思路：</h3>
<p>1、双击.pcapng文件，在Wireshark中打开，开始分析流量。我首先大致浏览了一下流量，发现HTTP协议的流量有上传文件的痕迹。（upload上传）</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193508795.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193508795.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>2、通过在顶部过滤器输入“http”语句，将HTTP流量过滤出来。（也可以使用“http.request.method==POST”语句实现更精确的过滤）</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193511377.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193511377.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>3、我是将每一条上传的流量都追踪HTTP流，最后找到有flag的报文。其实，可以查看流量的提示信息更快的定位目标流量。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193513413.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193513413.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>4、在这条流量的提示信息中，我们看到包含JPEG图像，追踪这条流量的HTTP流，看到很多的数据，在数据的最下面找到flag。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193515560.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193515560.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193516983.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193516983.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>da73d88936010da1eeeb36e945ec4b97<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF 被劫持的神秘礼物 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-%E8%A2%AB%E5%8A%AB%E6%8C%81%E7%9A%84%E7%A5%9E%E7%A7%98%E7%A4%BC%E7%89%A9-1/</link>
      <pubDate>Mon, 23 Sep 2024 22:49:54 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-%E8%A2%AB%E5%8A%AB%E6%8C%81%E7%9A%84%E7%A5%9E%E7%A7%98%E7%A4%BC%E7%89%A9-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193448672.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193448672.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193450784.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193450784.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;某天小明收到了一件很特别的礼物，有奇怪的后缀，奇怪的名字和格式。小明找到了知心姐姐度娘，度娘好像知道这是啥，但是度娘也不知道里面是啥。。。你帮帮小明？找到帐号密码，串在一起，用32位小写MD5哈希一下得到的就是答案。 链接: &lt;a href=&#34;https://pan.baidu.com/s/1pwVVpA5_WWY8Og6dhCcWRw&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://pan.baidu.com/s/1pwVVpA5_WWY8Og6dhCcWRw&lt;/a&gt; 提取码: 31vk&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193448672.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193448672.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193450784.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193450784.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>某天小明收到了一件很特别的礼物，有奇怪的后缀，奇怪的名字和格式。小明找到了知心姐姐度娘，度娘好像知道这是啥，但是度娘也不知道里面是啥。。。你帮帮小明？找到帐号密码，串在一起，用32位小写MD5哈希一下得到的就是答案。 链接: <a href="https://pan.baidu.com/s/1pwVVpA5_WWY8Og6dhCcWRw"target="_blank" rel="noopener noreferrer">https://pan.baidu.com/s/1pwVVpA5_WWY8Og6dhCcWRw</a> 提取码: 31vk</p>
<h3 id="密文">密文：</h3>
<p>下载附件，得到一个名为gift.pcapng的wireshark流量包。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193452658.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193452658.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、双击gift.pcapng文件，进入Wireshark中。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193454456.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193454456.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>题目要求找到帐号密码，我们先将HTTP流量过滤出来看一下。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193456943.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193456943.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>看到一个POST方法和两个GET方法，直奔POST方法的那条流量，追踪它的HTTP流，找到账号和密码。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193459085.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193459085.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl"><span class="nv">name</span><span class="o">=</span>admina<span class="p">&amp;</span><span class="nv">word</span><span class="o">=</span>adminb
</span></span></code></pre></td></tr></table>
</div>
</div><p>2、将帐号密码串在一起，使用在线网站对字符串进行32位小写MD5哈希加密，得到flag值。
<a href="https://www.sojson.com/md5/"target="_blank" rel="noopener noreferrer">MD5加密解密工具</a>

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193500996.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228193500996.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>1d240aafe21a86afc11f38a45b541a49<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
  </channel>
</rss>
