ext3

[src = 攻防世界] ext3

题目描述

今天是菜狗的生日,他收到了一个linux系统光盘

WP

将下载附件放到linux系统查看file格式,如下:

1
2
root@kali:~/Downloads# file 630a886233764ec2a63f305f318c8baa
630a886233764ec2a63f305f318c8baa: Linux rev 1.0 ext3 filesystem data, UUID=cf6d7bff-c377-403f-84ae-956ce3c99aaa

再strings查看一下有没有flag这样的字符串:

1
2
3
4
5
6
7
8
root@kali:~/Downloads# strings 630a886233764ec2a63f305f318c8baa |grep flag
.flag.txt.swp
flag.txtt.swx
~root/Desktop/file/O7avZhikgKgbF/flag.txt
.flag.txt.swp
flag.txtt.swx
.flag.txt.swp
flag.txtt.swx

flag应该在flag.txt中。

  1. 挂载光盘:

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    root@kali:~/Downloads# mount 630a886233764ec2a63f305f318c8baa /mnt
    root@kali:~/Downloads# cd /mnt
    root@kali:/mnt# ls
    02CdWGSxGPX.bin 0Xs 4A 8HhWfV9nK1 gtj i KxEQM LvuGM n OOoOs Q rhZE1LZ6g SPaK8l2sYN
    0GY1l 1 6JR3 8nwg h imgLDPt4BY LG6F lWIRfzP NgzQPW orcA qkCN8 Ruc9 SrZznhSAj
    0h3a5 2X 6wUaZE1vbsW 8RxQG4bvd H ix1EMRHRpIc2 Lh m Nv oSx2p QmUY1d RZTOGd t
    0l 3 7H7geLlS5 FinD H2Zj8FNbu j6uLMX LlC6Z0zrgy.bin m9V0lIaElz o OT QQY3sF63w scripts T
    0qsd 3J 8A2MFawD4 fm hdi7 jE LO0J8 MiU O7avZhikgKgbF poiuy7Xdb r sdb.cramfs TFGVOSwYd.txt
    0wDq5 44aAm 8DQFirm0D g hYuPvID jj lost+found Mnuc o8 px6u Raf3SYj sn
    root@kali:/mnt# cd O7avZhikgKgbF/
    root@kali:/mnt/O7avZhikgKgbF# ls
    flag.txt
    root@kali:/mnt/O7avZhikgKgbF# cat flag.txt
    ZmxhZ3tzYWpiY2lienNrampjbmJoc2J2Y2pianN6Y3N6Ymt6an0=

    一串base64,解码即可得到flag。

  2. 使用binwalk命令提取文件:

    1
    root@kali:~/Downloads# binwalk -e 630a886233764ec2a63f305f318c8baa

    找到flag.txt,发现base64编码,I解码得到flag。

  3. 直接将文件后缀改为zip,解压,找到flag.txt,发现base64编码,I解码得到flag。