TFCCTF2021 Writeup

SEA LANGUAGE 1

Quick! Help! We are sinking!

Wrap the result in TFCCTF{}


看着像摩斯码,直接在gchq.github.io上解密

image-20211202204916391

flag:TFCCTF{WH4T-AR3-Y0U-S1NK1NG-AB0UT?!!!?}

SEA LANGUAGE? 2

That's just another way to......


题目给的数据8个字符为一组,猜测可能是二进制,在gchq.github.io.替换为0,_替换为1,然后二进制转字符串

image-20211202205739848

flag:TFCCTF{w417_4_m1nu73..._7h15_1s_n07_m0rs3!!!!!r1gh7?}

AAAAA

AAAAA. That's all


首先用exiftool分析,提示文件前2000个字节都是A

~$ exiftool AAAAA
ExifTool Version Number         : 12.31
File Name                       : AAAAA
Directory                       : .
File Size                       : 157 KiB
File Modification Date/Time     : 2021:11:27 00:33:54+08:00
File Access Date/Time           : 2021:11:27 00:35:25+08:00
File Inode Change Date/Time     : 2021:11:27 00:34:19+08:00
File Permissions                : -rw-r--r--
Error                           : First 2000 bytes of file is ASCII 'A' characters

hexdump -C AAAAA 发现文件末尾的字节也有很多A,并且文件应该是一张PNG格式的图片

~$ hexdump -C AAAAA | head
00000000  41 41 41 41 41 41 41 41  41 41 41 41 41 41 41 41  |AAAAAAAAAAAAAAAA|
*
000007d0  89 50 4e 47 0d 0a 1a 0a  00 00 00 0d 49 48 44 52  |.PNG........IHDR|
000007e0  00 00 07 62 00 00 05 89  08 02 00 00 00 23 47 40  |...b.........#G@|
000007f0  3c 00 00 00 09 70 48 59  73 00 00 2e 23 00 00 2e  |<....pHYs...#...|
00000800  23 01 78 a5 3f 76 00 02  65 2b 49 44 41 54 78 9c  |#.x.?v..e+IDATx.|
00000810  ec bd 67 7b 1a cb da b4  dd 83 10 39 83 50 b6 bd  |..g{.......9.P..|
00000820  c2 de ff ff df dc ef 5e  6b d9 96 ad 48 ce 39 cc  |.......^k...H.9.|
00000830  fb a1 9e a9 e3 12 b2 bd  1c 24 10 50 e7 07 1d 08  |.........$.P....|
00000840  21 18 26 f4 74 57 57 d7  e5 f9 be ef 84 10 42 08  |!.&.tWW.......B.|

~$ hexdump -C AAAAA | tail  
00026cf0  00 00 88 26 13 03 00 00  00 00 44 93 89 01 00 00  |...&......D.....|
00026d00  00 00 a2 c9 c4 00 00 00  00 00 d1 64 62 00 00 00  |...........db...|
00026d10  00 80 68 32 31 00 00 00  00 40 34 99 18 00 00 00  |..h21....@4.....|
00026d20  00 20 9a 4c 0c 00 00 00  00 10 4d 26 06 00 00 00  |. .L......M&....|
00026d30  00 88 f6 7f 00 7a e5 96  20 a3 a9 bd a4 00 00 00  |.....z.. .......|
00026d40  00 49 45 4e 44 ae 42 60  82 41 41 41 41 41 41 41  |.IEND.B`.AAAAAAA|
00026d50  41 41 41 41 41 41 41 41  41 41 41 41 41 41 41 41  |AAAAAAAAAAAAAAAA|
*
00027510  41 41 41 41 41 41 41 41  41                       |AAAAAAAAA|
00027519

去除文件首位的A即可,代码:

from pathlib import  Path
p = Path('AAAAA')
data = p.read_bytes()
data = data.strip(b'A')
Path('a.png').write_bytes(data)

AAAAA.png

flag:TFCCTF{Gr4phic_d35ign_is_my_p455ion}

DISCORD SHENANIGANS

We considered giving you a free flag. However, we decided against it. In general, we would never do that! Or would we? That's the beginning of a good CTF! Discord is the new Twitter.

To be able to solve this challenge, you'll need to join our discord. Link in the Rules page.


翻阅比赛官方的Discord,发现#general频道有一条特别奇怪的消息

image-20211203203451799

使用Twitter Secret Messages解密即可

image-20211202215347694

flag:TFCCTF{th1s_5t3g0_fl4g_w45_n0t_h1dden_w3ll}

PRETTY GOOD PHISHER

This phisher thinks he's the game! We got his PGP Key ID from his phishing e-mail, and we know for sure that he has another PGP key publicized under his real name! Can you find out more about him?

A2DCB36111E3656B


题目给了一个人的PGP密钥ID,要求我们找到他另一个以真名公开的PGP密钥

https://keyserver.pgp.com/上检索,得到邮箱[email protected]

image-20211203195242066

OSINT Tool上搜索该邮箱,得到用户名是Theobald Dannie Gyles

image-20211203200112827

https://keyserver.pgp.com/上搜索包含该用户名的PGP密钥,即可得到flag

image-20211203201556442

flag:TFCCTF{Pee,G...Pee!_w4s_wh4t_th4t_h3_t0ld_m3....!})

您的支持是我继续创作最大的动力!

欢迎关注我的其它发布渠道