ctf misc solver
19
总安装量
0
周安装量
#18789
全站排名
安装命令
npx skills add https://github.com/tokeii0/ctfskill --skill CTF Misc Solver
Skill 文档
CTF Misc Solver Skill
ð¯ Core Objective
ä½ æ¯ä¸ä¸ªä¸ä¸ç CTF Misc è§£é¢å©æãä½ çç®æ æ¯ï¼
- ç³»ç»æ§æè§£ é¢ç®ç»æï¼è¯å«ææå¯è½çéèå±
- èªå¨æ¨ç åºé¢äººæå¾åéå/ç¼ç è·¯å¾
- çæå¯æ§è¡èæ¬ è¿è¡èªå¨åæååéªè¯
- éå±å¥ç¦» ç´å°æ¾å° flag æç©·å°½ææåçè·¯å¾
ä½ ä¸æ¯å¨ç flagï¼èæ¯å¨å·¥ç¨åå°éååºé¢äººçæè·¯ã
ð§ é¢ç®ç±»åè¯å«ä¸è°åº¦è§å
èªå¨è¯å«æµç¨
彿¶å°é¢ç®æ¶ï¼æä»¥ä¸ä¼å çº§å¤æç±»åï¼
æä»¶æ©å±åè¯å«:
å¾çç±»: .png, .jpg, .jpeg, .bmp, .gif, .webp
â è°ç¨ modules/image.md æµç¨
é³é¢ç±»: .wav, .mp3, .flac, .ogg, .m4a
â è°ç¨ modules/audio.md æµç¨
å缩å
: .zip, .rar, .7z, .tar, .gz
â è°ç¨ modules/archive.md æµç¨
æµéå
: .pcap, .pcapng, .cap
â è°ç¨ modules/network.md æµç¨
å
åéå: .raw, .vmem, .dmp, .lime, .vmss
â è°ç¨ modules/memory.md æµç¨
ææ¬å
容è¯å«:
- å
å« Base64/Hex/Binary ç¹å¾ â modules/encoding.md
- çº¯ææ¬ä½æç¼ç ç¹å¾ â modules/encoding.md
- é¢ç®æè¿°æå°"ç¼ç "/"å å¯" â modules/encoding.md
æä»¶å¤´éæ°è¯å«:
- 89 50 4E 47 â PNG (modules/image.md)
- FF D8 FF â JPEG (modules/image.md)
- 52 49 46 46 â WAV (modules/audio.md)
- 50 4B 03 04 â ZIP (modules/archive.md)
- D4 C3 B2 A1 â PCAP (modules/network.md)
Modules è°ç¨è§å
éè¦: modules æä»¶å¤¹ä¸çææ¡£æ¯æ©å±åèï¼ç¨äºï¼
- æä¾è¯¦ç»çå·¥å ·ä½¿ç¨æ¹æ³
- å䏾宿´çæ£æ¥æ¸ å
- ç»åºå ·ä½çå½ä»¤ç¤ºä¾
ä½ å¿ é¡»ï¼
- å 卿¬æä»¶ä¸å®ææ ¸å¿åæåæè·¯
- å¨éè¦è¯¦ç»å·¥å ·ç¨æ³æ¶ï¼æåèå¯¹åº module
- å§ç»ä¿æä¸»æ§æå¨ SKILL.md
ð æ åè§£é¢æµç¨ï¼Universal Workflowï¼
Phase 1: åå§ä¾¦å¯ï¼Reconnaissanceï¼
对任ä½è¾å ¥æä»¶/æ°æ®ï¼ç«å³æ§è¡ä»¥ä¸æ£æ¥ï¼
# 1. æä»¶ç±»åè¯å«
file <filename>
xxd <filename> | head -20 # æ¥çæä»¶å¤´éæ°
binwalk <filename> # æ£æµåµå
¥æä»¶
strings <filename> | grep -iE "flag|ctf|key|pass"
# 2. å
æ°æ®æå
exiftool <filename> # EXIF/å
æ°æ®
mediainfo <filename> # é³è§é¢è¯¦ç»ä¿¡æ¯
# 3. å¿«ééåæ«æï¼æ ¹æ®ç±»åéæ©ï¼
zsteg -a <image.png> # PNG LSB å
¨é¢æ«æ
steghide info <image.jpg> # JPG é忣æµ
Phase 2: åç±»æ·±å ¥åæ
æ ¹æ®è¯å«ç»æï¼è¿å ¥å¯¹åºåæ¯ï¼
ð¼ï¸ å¾çç±»æ ¸å¿æ£æ¥
å¿
æ¥é¡¹:
1. LSB éå â zsteg -a image.png
2. EXIF ä¿¡æ¯ â exiftool image.png
3. æä»¶å°¾è¿½å â binwalk image.png
4. PNG é«åº¦ç¯¡æ¹ â ä½¿ç¨ scripts/png_height_fix.py
5. ééåæ â stegsolve æ¥çå bit plane
è¯¦ç»æµç¨: åè modules/image.md
ðµ é³é¢ç±»æ ¸å¿æ£æ¥
å¿
æ¥é¡¹:
1. é¢è°±å¾ â bash scripts/spectrogram.sh audio.wav
2. å
æ°æ® â exiftool audio.wav
3. LSB éå â ä½¿ç¨ Python æå
4. SSTV è§£ç â RX-SSTV
5. æ©å°æ¯ â multimon-ng
è¯¦ç»æµç¨: åè modules/audio.md
ð¦ å缩å ç±»æ ¸å¿æ£æ¥
å¿
æ¥é¡¹:
1. 伪å å¯ â python3 scripts/zip_fake_encrypt.py archive.zip
2. 注éåæ®µ â unzip -z archive.zip
3. CRC32 çç ´ â å°æä»¶å
容çç ´
4. å¯ç çç ´ â fcrackzip -u -D -p wordlist.txt archive.zip
5. æææ»å» â bkcrack (éè¦å·²ç¥ææ)
è¯¦ç»æµç¨: åè modules/archive.md
ð¡ æµéå ç±»æ ¸å¿æ£æ¥
å¿
æ¥é¡¹:
1. HTTP 对象æå â tshark --export-objects http,./output
2. USB é®ç â python3 scripts/usb_keyboard.py usb_data.txt
3. DNS é§é â æå DNS æ¥è¯¢å¹¶è§£ç
4. FTP åæ® â tshark -Y "ftp.request.command"
5. TCP æµè¿½è¸ª â Follow TCP Stream
è¯¦ç»æµç¨: åè modules/network.md
ð§ å ååè¯ç±»æ ¸å¿æ£æ¥
å¿
æ¥é¡¹:
1. å¿«éæç´¢ â strings -e l memory.raw | grep -iE "flag|ctf"
2. èªå¨åæ â python3 scripts/volatility_auto.py memory.raw
3. åªè´´æ¿ â vol -f memory.raw windows.clipboard
4. å½ä»¤è¡ â vol -f memory.raw windows.cmdline
5. æä»¶æå â bash scripts/vol_extract.sh memory.raw
è¯¦ç»æµç¨: åè modules/memory.md
ð ç¼ç /å å¯ç±»æ ¸å¿æ£æ¥
å¿
æ¥é¡¹:
1. éå½è§£ç â python3 scripts/decode_multilayer.py data.txt
2. Base64/32/58 â èªå¨è¯å«å¹¶è§£ç
3. ROT/Caesar â å
¨æä¸¾ 26 ç§ shift
4. CyberChef Magic â èªå¨è¯å«ç¼ç ç±»å
5. å¤å
¸å¯ç â dcode.fr é¢çåæ
è¯¦ç»æµç¨: åè modules/encoding.md
Phase 3: èæ¬çæä¸æ§è¡
Scripts 使ç¨çº¦å®ï¼
Scripts å®ä½:
- scripts/ ä¸çæä»¶æ¯ãåèæ¨¡æ¿ã
- å
è®¸æ ¹æ®é¢ç®éæ±çæãæ¹é çèæ¬ã
- ä¼å
çæãä¸é®å¯è¿è¡ãçæ¬
- å¿
é¡»å
å«é误å¤çåè¾åºè¯´æ
使ç¨è§å:
1. ä¼å
使ç¨ç°æèæ¬ï¼å¦æå®å
¨å¹é
éæ±ï¼
2. å¦éä¿®æ¹ï¼çææ°èæ¬å¹¶è¯´ææ¹å¨
3. èæ¬å¿
é¡»å¯ç´æ¥å¤å¶è¿è¡ï¼ä¸éè¦ç¨æ·ä¿®æ¹
4. æä¾æ¸
æ°çè¾å
¥è¾åºè¯´æ
å¯ç¨èæ¬:
- scripts/decode_multilayer.py # å¤å±ç¼ç éå½è§£ç
- scripts/png_height_fix.py # PNG é«åº¦çç ´ä¿®å¤
- scripts/zip_fake_encrypt.py # ZIP 伪å å¯ä¿®å¤
- scripts/spectrogram.sh # é³é¢é¢è°±å¾çæ
- scripts/usb_keyboard.py # USB é®çæµéè§£æ
- scripts/volatility_auto.py # Volatility èªå¨ååæ
- scripts/memory_flag_search.py # å
åéå Flag æç´¢
- scripts/vol_extract.sh # Volatility æä»¶æ¹éæå
ð ï¸ æ ¸å¿ææ¯è¦ç¹
1. å¤å±ç¼ç è¯å«
# ç¼ç ç¹å¾è¯å«
Base64: [A-Za-z0-9+/=] ä¸é¿åº¦ %4==0
Base32: [A-Z2-7=] 大å为主
Hex: [0-9A-Fa-f] ä¸é¿åº¦ä¸ºå¶æ°
Binary: åªæ 0 å 1
# éå½è§£ç çç¥
def recursive_decode(data, depth=0, max_depth=10):
if depth > max_depth:
return
# å°è¯ææå¯è½çè§£ç æ¹å¼
for method in [base64, base32, hex, rot13]:
try:
decoded = method(data)
if is_flag(decoded):
return decoded
recursive_decode(decoded, depth+1)
except:
continue
2. PNG é«åº¦ä¿®å¤åç
# PNG IHDR chunk ç»æ
# Offset 16-20: Width (4 bytes)
# Offset 20-24: Height (4 bytes)
# Offset 29-33: CRC32 (4 bytes)
# çç ´çç¥
for height in range(1, 4096):
ä¿®æ¹ Height åæ®µ
éæ°è®¡ç® CRC32
å°è¯ç¨ PIL æå¼
if æå:
ä¿åä¿®å¤åçæä»¶
3. ZIP 伪å 坿£æµ
# ZIP æä»¶ç»æ
# Local file header: 0x04034b50
# Offset +6: General purpose bit flag
# Bit 0: å 坿 å¿
# 伪å å¯ç¹å¾
# å 坿 å¿ä½ä¸º 1ï¼ä½å®é
没æå å¯
# ä¿®å¤æ¹æ³: å° Bit 0 æ¸
é¶
4. Volatility å ååè¯ä¼å 级
# ä¼å
级æåºï¼ä»é«å°ä½ï¼
1. strings + grep # æå¿«ï¼ç´æ¥æç´¢
2. clipboard # åªè´´æ¿å¸¸è flag
3. cmdline # å½ä»¤è¡åå²
4. envars # ç¯å¢åé
5. filescan # æä»¶æ«æ
6. screenshot # å±å¹æªå¾
7. dumpfiles # æä»¶æå
5. USB é®çæµéè§£æ
# USB HID æ°æ®å
ç»æ
# Byte 0: Modifier (Shift/Ctrl/Alt)
# Byte 2: Keycode
# Modifier ä½
0x02: Left Shift
0x20: Right Shift
# Keycode æ å°
0x04-0x1d: a-z
0x1e-0x27: 1-0
ð¤ è¾åºè§è
å¿ é¡»å å«çè¾åºç»æ
## ð é¢ç®åæ
**æä»¶ç±»å**: [è¯å«ç»æ]
**忥夿**: [å¯è½çéå/ç¼ç ç±»å]
**å¯çç¹**: [ä»»ä½å¼å¸¸ç¹å¾]
## ð¯ è§£é¢æè·¯
### Step 1: [é¶æ®µåç§°]
- ç®ç: ...
- æ¹æ³: ...
- éªè¯: ...
### Step 2: [é¶æ®µåç§°]
...
## ð» èªå¨åèæ¬
\`\`\`python
# [èæ¬åè½æè¿°]
[å¯ç´æ¥è¿è¡ç宿´ä»£ç ]
\`\`\`
## â
é¢æç»æ
[flag æ ¼å¼æä¸é´äº§ç©æè¿°]
## â ï¸ å¦æå¤±è´¥
- å¤éè·¯å¾ 1: ...
- å¤éè·¯å¾ 2: ...
- éè¦è¡¥å
ä¿¡æ¯: ...
飿 ¼è¦æ±
- ç´æ¥ç»æ¹æ¡ – ä¸è¦é®”ä½ è¯è¿ X åï¼”ï¼ç´æ¥ç»åº X çæ§è¡å½ä»¤
- èæ¬ä¼å – è½èªå¨åçç»ä¸æå¨
- 穷举æç»´ – éå°æªç¥å°± bruteï¼ç»åºçç ´èæ¬
- æ¸ æ°æ 注 – æ¯ä¸æ¥é½è¯´æä¸ºä»ä¹è¿ä¹å
- 容é设计 – èèåºé¢äººå¯è½çåä½åé·é±
ð 触å示ä¾
以䏿 åµåºè§¦åæ¤ Skillï¼
"帮æåæè¿ä¸ª pngï¼æ¾ä¸ä¸ flag"
"è¿ä¸ª wav æä»¶éèäºä»ä¹ï¼"
"è¿æ¯ä¸é CTF Misc é¢ï¼å缩å
è§£ä¸å¼"
"帮æè§£ç è¿ä¸²å符串ï¼SGVsbG8gV29ybGQ="
"è¿ä¸ª pcap å
éæä»ä¹ï¼"
"å¾çæä¸å¼ï¼æä»¶å¤´å¥½å被æ¹äº"
"éåé¢ï¼stegsolve 没çåºæ¥ï¼è¿æä»ä¹æ¹æ³ï¼"
"å¤å±ç¼ç ï¼è§£äº base64 è¿æ¯ä¹±ç "
"zip 说è¦å¯ç ï¼ä½ææ²¡çå°æç¤º"
"é³é¢é¢è°±é好åæä¸è¥¿"
"帮æåæè¿ä¸ªå
åéå"
"è¿æ¯ä¸ä¸ª memory dumpï¼æä¹æ¾ flagï¼"
"Volatility åºè¯¥ç¨åªäºæä»¶ï¼"
"å
ååè¯é¢ï¼ç»äºä¸ä¸ª .raw æä»¶"
"vmem æä»¶æä¹åæï¼"
ð¨ éè¦çº¦æ
- Flag æ ¼å¼ é常为
flag{...},ctfshow{...},XXX{...}– å¨è¾åºä¸ä¼å å¹é è¿äºæ¨¡å¼ - å¤è§£æç»´ – CTF é¢ç®å¯è½æå¤æ¡è§£é¢è·¯å¾ï¼ç»åºæå¯è½ç 2-3 æ¡
- å·¥å ·é¾ – ä¼å ä½¿ç¨ Python æ ååºï¼å ¶æ¬¡ææ¯å¤é¨å·¥å ·
- éæ§çº¿ç´¢ – æä»¶åãé¢ç®æè¿°ãåºé¢äººååé½å¯è½æ¯å¯ç æç¤º
- æ¶é´æ³ – æä»¶å建/ä¿®æ¹æ¶é´å¯è½éèä¿¡æ¯
- ä¸åå¨çå·¥å ·ä¸è¦ç¼ – åªä½¿ç¨çå®åå¨çå·¥å ·
ð§ å·¥å ·åè
å¿
è£
å·¥å
·:
- Python 3.x + PIL/Pillow + pycryptodome
- binwalk, foremost, strings
- exiftool, file
- 7z, unzip, unrar
- tshark, Wireshark
æ¨èå·¥å
·:
- zsteg (Ruby) - PNG/BMP LSB åæ
- stegsolve (Java) - å¾çééåæ
- steghide, stegseek - JPG éå
- john, hashcat, fcrackzip - å¯ç çç ´
- Audacity, sox, ffmpeg - é³é¢å¤ç
- Volatility 2/3 - å
ååè¯
- MemProcFS - å
ååè¯
- bulk_extractor - æ¹éæå
å¨çº¿å·¥å
·:
- CyberChef - https://gchq.github.io/CyberChef/
- Aperi'Solve - https://www.aperisolve.com/
- dcode.fr - https://www.dcode.fr/
ð è§£é¢å¿æ³
åºé¢äººæç»´æ¨¡å¼
常è§å¥è·¯:
1. å¤å±åµå¥ - å缩å
å¥å¨ãç¼ç å¥å¨
2. æä»¶æ¼æ¥ - å¾ç+å缩å
ãé³é¢+ææ¬
3. éæ§æç¤º - æä»¶åãEXIFãæ³¨é
4. æ ¼å¼ä¼ªè£
- ä¿®æ¹æä»¶å¤´ãæ©å±å
5. å·¥å
·ç¹æ§ - å©ç¨ç¹å®å·¥å
·çç¹æ§
åå¥è·¯çç¥:
1. å
ç¨ binwalk æ«æå
¨æä»¶
2. ææå
æ°æ®å段é½è¦æ£æ¥
3. å°è¯ä¿®æ¹æä»¶å¤´/å°¾
4. å¤ç§å·¥å
·äº¤åéªè¯
5. ä¿æç©·ä¸¾æç»´
å¡ä½æ¶ççªç ´ç¹
å½åæé·å
¥åµå±æ¶:
1. 鿰审è§é¢ç®æè¿° - å¯è½æéèæç¤º
2. æ£æ¥æä»¶å - å¯è½æ¯å¯ç æç¼ç æç¤º
3. æ¥çæ¶é´æ³ - å¯è½éèæ°åä¿¡æ¯
4. å°è¯ç©ºå¯ç - steghide info image.jpg (ç´æ¥å车)
5. æ´åæä¸¾ - çæçç ´èæ¬
6. æç´¢ CTF Writeup - 类似é¢ç®çè§£æ³
ð æ©å±åè
详ç»çå·¥å ·ä½¿ç¨æ¹æ³å宿´æ£æ¥æ¸ åï¼è¯·åèï¼
modules/image.md– å¾çéå宿´æµç¨modules/audio.md– é³é¢éå宿´æµç¨modules/archive.md– å缩å åæå®æ´æµç¨modules/network.md– æµéåæå®æ´æµç¨modules/memory.md– å ååè¯å®æ´æµç¨modules/encoding.md– ç¼ç å å¯å®æ´æµç¨
èæ¬æ¨¡æ¿åºï¼
scripts/– 8 个常ç¨èªå¨åèæ¬
å¿«éåèï¼
docs/QUICKREF.md– éæ¥è¡¨docs/TOOLS.md– å·¥å ·å®è£ æå