Linux学习记录
简介:文件处理命令目录相关pwd (print work directory)打印出当前目录$ pwdls (list)列出当前目录的所有文件。$ ls [opt][opt]:a 显示所有文件及目录l 以列表形式显示文件与目录la a与l的混用cd (change directory)改变目录cd [path][path]:'..' 返回上级目录mkdir (Make directory)创建目录mkdir [opt] [path][opt]:p 创建多级目录(不用此命令创建多级目录会报错)rmdir (remove directory)删除空文件夹rmdir [opt][opt]:p 更彻底,回去判断上级目录是否在下级目录删除后也成了空目录文件相关touch创建文件touch [path]cp (copy)复制文件cp [opt] [from] [to][opt]:r 递归复制整个文件夹rm (remove)移除 文件|文件夹rm [opt] [path][opt]:r 递归删除整个文件夹f force强行删除,无提示此命令有著名的垃圾清理这个实际是删库跑路的命令sudo rm rf /*mv (move)移动文件或目录mv [from] [to]当from和to一致时可以达成修改文件名的效果~cat查看文件cat [path]Vim的使用Vim是linux下的代码编辑器,无错误提示,长期使用,可以更好的养成编程的好习惯。vim下的几种模式图示非常清楚~编辑模式的命令:w 保存:wq 保存并退出:q! 强制退出不保存:set nu 显示行号:set nonu 不显示行号:[行号] 跳转行命令模式下的命令yy 拷贝当前行5yy 拷贝向下的5行p 粘贴拷贝内容dd 删除当前行5dd 删除向下5行/[查找内容] 进入查找模式按n查找下一个u 撤销操作G 跳转最末行gg 跳转首行5gg 跳转第五行
2024年4月20日
Saturday.
焦点
近期文章
Linux学习记录
简介:文件处理命令目录相关pwd (print work directory)打印出当前目录$ pwdls (list)列出当前目录的所有文件。$ ls [opt][opt]:a 显示所有文件及目录l 以列表形式显示文件与目录la a与l的混用cd (change directory)改变目录cd [path][path]:'..' 返回上级目录mkdir (Make directory)创建目录mkdir [opt] [path][opt]:p 创建多级目录(不用此命令创建多级目录会报错)rmdir (remove directory)删除空文件夹rmdir [opt][opt]:p 更彻底,回去判断上级目录是否在下级目录删除后也成了空目录文件相关touch创建文件touch [path]cp (copy)复制文件cp [opt] [from] [to][opt]:r 递归复制整个文件夹rm (remove)移除 文件|文件夹rm [opt] [path][opt]:r 递归删除整个文件夹f force强行删除,无提示此命令有著名的垃圾清理这个实际是删库跑路的命令sudo rm rf /*mv (move)移动文件或目录mv [from] [to]当from和to一致时可以达成修改文件名的效果~cat查看文件cat [path]Vim的使用Vim是linux下的代码编辑器,无错误提示,长期使用,可以更好的养成编程的好习惯。vim下的几种模式图示非常清楚~编辑模式的命令:w 保存:wq 保存并退出:q! 强制退出不保存:set nu 显示行号:set nonu 不显示行号:[行号] 跳转行命令模式下的命令yy 拷贝当前行5yy 拷贝向下的5行p 粘贴拷贝内容dd 删除当前行5dd 删除向下5行/[查找内容] 进入查找模式按n查找下一个u 撤销操作G 跳转最末行gg 跳转首行5gg 跳转第五行
ciscn校内赛wp
简介:记录一下.welcome拿到文件是个加密的压缩包,010editor打开看到目录区和头区都是0900可以知道是真加密,由提示知道密码是小明生日,用字典生成器生成可能的密码合集,直接用Elcomsoft Password Recovery进行爆破获得密码20161011,打开后是一个全黑的png图片,一样用010editor打开图片的两个IDAT区域被修改为了CTBU该回去发现图片正常访问,但还是没有flag,有可能是图片隐写,修改图片长度获取flagguanyu下载下来,发现是个模型文件,先在模型中找了找感觉不太可能,然后以压缩包形式打开从model.dat里直接获取了flagshark流量分析,从请求信息来看是在data中获取的flag,将http文件全部导出,打开data文件,是一个数组文件看着这值应该是ascii码解码直接获取flagdotab站搜原视频在对应时间找到flagcheers根据描述找出莫岳恒学长的b站账号,动态第一条发现杠哥发的一部分flag,在莫岳恒学长那条动态对应的视频下的评论中找到了flagdo you like archives revenge下载下来是一个压缩包,直接用手一个个解压不太现实,直接选择python脚本import os
import shutil
import zipfile
import tarfile
def decompress_file(file_path):
"""
解压文件函数
:param file_path: 压缩文件路径
"""
# 判断文件是否存在
if not os.path.exists(file_path):
print(f"File {file_path} not exist!")
return
# 获取文件名和文件夹路径
file_name = os.path.basename(file_path)
folder_path = os.path.dirname(file_path)
# 判断文件类型,并进行相应的解压操作
if file_name.endswith(".zip"):
with zipfile.ZipFile(file_path, "r") as zip_ref:
zip_ref.extractall(folder_path)
elif file_name.endswith(".tar") or file_name.endswith(".tar.gz") or file_name.endswith(".tgz"):
with tarfile.open(file_path, "r:*") as tar_ref:
tar_ref.extractall(folder_path)
# 删除原始压缩文件
os.remove(file_path)
# 遍历解压出来的文件,如果发现还有压缩文件,则再次进行解压操作
for file in os.listdir(folder_path):
file_path = os.path.join(folder_path, file)
if zipfile.is_zipfile(file_path) or tarfile.is_tarfile(file_path):
decompress_file(file_path)
# 测试代码,解压指定文件夹下的所有压缩文件
source_folder = "./ge"
for root, dirs, files in os.walk(source_folder):
for file in files:
file_path = os.path.join(root, file)
if zipfile.is_zipfile(file_path) or tarfile.is_tarfile(file_path):
decompress_file(file_path)
解压后获得最后一个压缩包,发现是加密的,在压缩包中并没有发现0900类似的特征,感觉不像zip,直接用Winrar的修复功能直接揭秘出来了,打开获得flag1337最先是想在原视频找看了好久没找到,结果在5月10的聊天记录中发现flaggsh题目获得信息chatgpt做终端,直接尝试/flag成功获取flagmagic digit 5题目所说直接把原字符串进行Md5加密放入flag就是flagbase ctbu利用chatgpt写出解题函数# 解码函数
def base_ctbu_decode(s):
base_ctbu_alphabet = 'ABCDEFGHIJKLMNOPQRSTUVWXYZgsdxco6'
binary_str = ''
# 将密文每五个字符分为一段,解析出对应的二进制数据
for c in s:
binary_str += bin(base_ctbu_alphabet.index(c))[2:].rjust(5, '0')
# 将所有的二进制数据合并成一个二进制串,并转化为字符串
return ''.join([chr(int(binary_str[i:i+8], 2)) for i in range(0, len(binary_str), 8)])
# 调用解码函数解密密文
print(base_ctbu_decode('MZWGCZssNJgSINgoMNUEAsTHGNPXIgDFMVSWKXgBJRYEQQBYGMsXg666')) # Congratulations, you solved the challenge successfully.
获取flagassccciiiiiiiii由代码知道芝士一个字符出现的次数就是它对应ascii的位数,数字就是它的位置python直接解密the = "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111112222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333344444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444455555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555556666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666777777777777777777777777777777777777777777777777777777777777777777777777777777777777777777777777777888888888888888888888888888888888888888888888888899999999999999999999999999999999999999999999999991010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111112121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121213131313131313131313131313131313131313131313131313131313131313131313131313131313131313131313131313131313131313141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141415151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515151515161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161617171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717171717181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181818181819191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191919191920202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212121212122222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323232323242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242424242425252525252525252525252525252525252525252525252525252525252525252525252525252525252525252525252526262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262626262727272727272727272727272727272727272727272727272727272727272727272727272727272727272727272727272727272828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828282828"
num = 0
ttt = 0
tempNum = 0
flag = ""
while num < len(the):
while the[num:num + len(str(ttt))] == str(ttt):
tempNum += 1
num += len(str(ttt))
flag += chr(tempNum)
tempNum = 0
ttt += 1
print(flag)emperor利用chatgpt写出脚本import itertools
alphabet = bytes(range(32, 127))
encrypted_flag = b'39.4HF2@,A52,;.:_,\3,5]:,6P,o.2@.?J'
for key in itertools.count():
decrypted_flag = bytes([alphabet[(c key) % len(alphabet)] for c in encrypted_flag])
if decrypted_flag.startswith(b'flag{'):
print(decrypted_flag)
breakRuShArsa加密,质因数分解获取到了P q直接运行rsa的解密脚本获取明文,转化为二进制再转化为对应的ascii码获取到flagwall分析源码可知是将对应的字符类似字典一样换成对应的字符串,用python写一个字典去进行文件替换# 密文字典
encrypted_chars = {'a': '5a0f92fc99e8d1e5ea1677f987139c9c', 'b': '336766cfc9273d47294374c4456bd7e6',
'c': 'ab11f422e2ab0e5a672df60ac4d9978b', 'd': '04f44abda2d59984299dd1e56fedc671',
'e': '036f4d8d3c925c472af18052d047c6fb', 'f': '5b6d034b1552dd4c08199e32bebee520',
'g': 'bab20c076199ae86e5d92ea1edc1aa8f', 'h': '34a7aee723181478d6fe343788a109f9',
'i': '678a06a066ee8e6cf70bf53415fab592', 'j': 'cbd04e40d3e97ee1ca9ff95752614618',
'k': '0ec19b0e7976c4e6dfc0534803bb43f3', 'l': 'c62600a4b61358c21fb85b7c2945a332',
'm': 'e56d228da8a800aa54cdc5e9c925f262', 'n': '32e17a8fa2ad89536fd354d090bace19',
'o': 'f0ade343e3c05f8f71b58006e583933a', 'p': 'cb317151da3b66e0e6584d753baf3e01',
'q': '8b5878a92246878e9291037d1d4bd064', 'r': '3d668242905a3a4bc4ec7a905b2c7677',
's': '5a20662ff34f416e9f3abca66341c5c4', 't': '5ec5e06fc44cd2e99edcb67dd66ba1cb',
'u': 'b5768fc110d3e481fc2cab777698809d', 'v': 'ffa9532cdfdaa513471a51bfedf9022d',
'w': 'a171eda69cfbf433539ff32da4945f1f', 'x': '981fa79016ab8ae14d60998c7704bb5d',
'y': '51b969ba3459798991e5d4d87f54e073', 'z': '67252b0bb8e9903969a8e8d0a971ca63',
'A': 'c07ffaf369a4853d34a2003c1c3f5c06', 'B': '125b3bc5f336a0b2baf4e2c6b2f052f0',
'C': 'd5a7d119d6d19950cc872bfde0b94c2e', 'D': 'e0a3a14c698c2ff493c0da81fc811cc7',
'E': '112904b32851e5381e3b8ae028e92ccb', 'F': '384fddb523563d8e3a559bf077c22168',
'G': 'acc874bcc5a8555c269a080acd59279e', 'H': 'ebea16b847782d7ebb2415722b44ad10',
'I': '32512f9482e8c7c125c04685ac86f796', 'J': '5b2740b2c1542130490b75d88650fa50',
'K': 'ab8447bcc2fbbacb6a5e48e338012a46', 'L': '385ac9cddde1de5be2ee318a2709bcaf',
'M': '3d6a3db691b627ac086e351d21fba44e', 'N': '1fef12d140914d31c17349a22ab1b00e',
'O': '17e434e1201600d31b1a6b6da9977bad', 'P': 'e902610b80f75b2d77becd914bcf5461',
'Q': 'c0b92ac23b1cc4665c53020cd6c8262e', 'R': '8a7643d64f010706b206528c9513e573',
'S': 'be7cdfccb4327b28312b99bb2776df81', 'T': 'f3ab52d0dab3e888e9f11d7170d0a3d5',
'U': '1741ad5607cf1395693de4e03244a0b8', 'V': 'ffd2286b17224e320a106aa6037a5a33',
'W': '9a491f19d9cbc5b2f5321ffcd1ffb98c', 'X': '748c91af7880d9e4b654a7b0086c75f8',
'Y': '8a6026ad6887f67cf798fbf4e1debe25', 'Z': 'b3693036b7928c98e46d3d5b1bb5d53f',
'0': '4312ef16a9e53149b0e4289d8a1c292c', '1': '37b8464c61284dfb3bafd47bb883c20a',
'2': '255c6e619a1a1679cc3fd3c506e06c3c', '3': 'c255163951f0003f300168c9ed863e38',
'4': '0d4bf2556609bde9bdf7e154f0bc01d0', '5': '389b3cbf9bdc47727aa3d60d960b4b7a',
'6': '804256547141e1414f335a93d0aee2c9', '7': '91335eadbca437e6c96889da774186c2',
'8': 'fad58ae4e9a6698aa3438b28f6f745cd', '9': 'e82c249a79d044b3c4891b8077736906',
'{': '113780962f6031c7a4e00173bfcee17d', '_': '909e2c7a0962fdd07016dbb3c368e015',
'}': '303ce188742781b005773b41173f8cfa'}
# 将密文字典的键值对互换,得到明文字
encrypted_flag = '5b6d034b1552dd4c08199e32bebee520c62600a4b61358c21fb85b7c2945a3325a0f92fc99e8d1e5ea1677f987139c9cbab20c076199ae86e5d92ea1edc1aa8f113780962f6031c7a4e00173bfcee17da171eda69cfbf433539ff32da4945f1f112904b32851e5381e3b8ae028e92ccb37b8464c61284dfb3bafd47bb883c20a37b8464c61284dfb3bafd47bb883c20a909e2c7a0962fdd07016dbb3c368e0155ec5e06fc44cd2e99edcb67dd66ba1cb34a7aee723181478d6fe343788a109f937b8464c61284dfb3bafd47bb883c20a389b3cbf9bdc47727aa3d60d960b4b7a909e2c7a0962fdd07016dbb3c368e01537b8464c61284dfb3bafd47bb883c20a5a20662ff34f416e9f3abca66341c5c4909e2c7a0962fdd07016dbb3c368e01532e17a8fa2ad89536fd354d090bace194312ef16a9e53149b0e4289d8a1c292c91335eadbca437e6c96889da774186c2909e2c7a0962fdd07016dbb3c368e01591335eadbca437e6c96889da774186c234a7aee723181478d6fe343788a109f95a0f92fc99e8d1e5ea1677f987139c9c5ec5e06fc44cd2e99edcb67dd66ba1cb909e2c7a0962fdd07016dbb3c368e01537b8464c61284dfb3bafd47bb883c20ae56d228da8a800aa54cdc5e9c925f262cb317151da3b66e0e6584d753baf3e013d668242905a3a4bc4ec7a905b2c7677c255163951f0003f300168c9ed863e38bab20c076199ae86e5d92ea1edc1aa8f32e17a8fa2ad89536fd354d090bace195a0f92fc99e8d1e5ea1677f987139c9c336766cfc9273d47294374c4456bd7e6c62600a4b61358c21fb85b7c2945a332036f4d8d3c925c472af18052d047c6fb303ce188742781b005773b41173f8cfa'
decrypted_flag = ''
for i in range(0, len(encrypted_flag), 32):
encrypted_block = encrypted_flag[i:i+32]
for char, encrypted_char in encrypted_chars.items():
if encrypted_char == encrypted_block:
decrypted_flag += char
break
print(decrypted_flag)htmlweb签到题,直接查看源代码获取flagi am root访问后发现是接收get请求,当get的值为root的时候发现页面变化,在burp的response中搜索到了flagzuploadfile get content,直接伪协议,构建payload。php://filter/read=convert.base64 encode/resource=/flagzupload pro代码查看发现仅仅是对前端进行限制了,直接burp绕过前端,上大马获取shell,拿到flagzupload pro plus查看代码,看到对文件名进行了简单的检查,文件名以.进行分割成数组,判断数组的第二个元素是否为zip,文件名为shell.zip.php成功上传,获取shell拿到flagzupload pro plus max用了include函数来接收用户的get请求,伪协议php://filter/read=convert.base64 encode/resource=/flag获取flagzupload pro plus max ultra题目bug,伪协议直接过zupload pro plus max ultra premium查看代码,发现上传的文件会被解压,先上传了一个包含shell的zip打开之后发现这个文件夹的内容只能下载,不会运行在服务器,后面用ln建立一个软连接链接到根目录的/flag处然后压缩进压缩包,这样这个文件在服务器上内容就会于flag同步,下载下来获取flagopagida打开获取flagnohtyppyc文件,进行反编译得到一个数组,ascii解密获取flagflag = [
125,
51,
56,
97,
117,
103,
110,
64,
108,
95,
56,
110,
49,
109,
109,
97,
114,
103,
48,
114,
112,
95,
99,
49,
109,
64,
110,
121,
100,
95,
114,
48,
102,
95,
101,
53,
114,
101,
118,
51,
114,
123,
103,
97,
108,
102]stick game在文件夹里打开这个网页,他说要1000分就能获取Flag,控制台处直接修改score变量为10000,自杀获取flagandrogin下载下来后是个apk,安装后提示要账号密码才能获取flag,直接手机上用Mt管理器打开apk在classes3.dex中找到了账号密码,获得了flagco pack题目提示upx,用exeinfope发现确实是套了壳的,直接用upx解密发现失败,在网上查了查可以用upxfix来修复,修复后进行upx命令执行成功,ida打开获取到了flag