getthekeytxt

[src = 攻防世界] Get-the-key.txt

WP

下载一个压缩包,解压得到forensic100。在KALI里面用file命令查看发现是一个文件系统。

1
2
# file forensic100
forensic100: Linux rev 1.0 ext2 filesystem data, UUID=0b92a753-7ec9-4b20-8c0b-79c1fa140869

然后用strings命令发现大量类似flag的字符串。一个个试会累死的。也同时发现了很多txt文件,尝试分离这些文件。

1
2
3
4
5
6
7
8
9
10
11
12
root@kali:~/Downloads/output/zip# binwalk forensic100

DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 Linux EXT filesystem, rev 1.0, ext2 filesystem data, UUID=0b92a753-7ec9-4b20-8c0b-79c1fa14fa14
1049600 0x100400 gzip compressed data, has original file name: "key.txt", from Unix, last modified: 2014-10-01 06:00:52
1050624 0x100800 gzip compressed data, has original file name: "key1.txt", from Unix, last modified: 2014-10-01 05:59:41
1051648 0x100C00 gzip compressed data, has original file name: "key10.txt", from Unix, last modified: 2014-10-01 05:59:41
1052672 0x101000 gzip compressed data, has original file name: "key100.txt", from Unix, last modified: 2014-10-01 05:59:41
1053696 0x101400 gzip compressed data, has original file name: "key101.txt", from Unix, last modified: 2014-10-01 05:59:41
1054720 0x101800 gzip compressed data, has original file name: "key102.txt", from Unix, last modified: 2014-10-01 05:59:41
1055744 0x101C00 gzip compressed data, has original file name: "key103.txt", from Unix, last modified: 2014-10-01 05:59:41

发现了大量分离的key文件,每一个里面都有大量flag。
根据题目提示,我们选择key.txt中的第一个flag提交成功。