菜狗杯,打得爽

# MISC

# Here You See A Passer By

# WP

直接走迷宫

image-20231226085000859

# FLAG

1
poctf{uwsp_pr377y_bu7_p377y_bu7_pr377y}

# If You Don't, Remember Me

# WP

通过 010 查看直接得

image-20231226091408145

将下划线后的密文进行 hex 转换得到 flag

image-20231226091510494

# FLAG

1
poctf{uwsp_w31c0m3_70_7h3_94m3}

# Absence Makes Hearts Go Yonder

# WP

直接在图片末尾发现 flag

image-20231226094804647

# FLAG

1
poctf{uwsp_h342d_y0u_7h3_f1257_71m3} 

# Between Secrets and Lies

# WP

LSB 隐写(Red-7 通道)

image-20231226095515343

# FLAG

1
poctf{uwsp_m0r3_hum4n_7h4n_hum4n_15_0ur_m0770}

# Sight Without Vision

# WP

直接用它给的网站对标题进行 “翻译”

image-20231226102806930

# FLAG

1
poctf{uwsp_519h7_w17h0u7_v1510n}

# A Petty Wage in Regret

# WP

在图片开头发现提示,进行 hex 转换,得到 part1

image-20231226175616370

image-20231226175550171

通过描绘图片中奇怪的痕迹,发现 part2

image-20231226175808528

# FLAG

1
poctf{uwsp_7h3_w0rld_h4d_17_f1257}

# Better to Burn in the Light

# WP

利用取证软件直接解

image-20231226181642146

image-20231226181710867

# FLAG

1
poctf{uwsp_5h1v3r_m3_71mb3r5}

# With Desperation and Need

# WP

利用 kali 的 rock you.txt 和题目提示:“gUn" 可搜得密码

用 VeraCrypt 解密磁盘文件可直接得 flag

image-20231226211147101

# FLAG

1
poctf{uwsp_qu4n717y_15_n07_4bund4nc3} 

# The Gentle Rocking of the Sun

# WP

利用百度可搜得密码

image-20231226210723329

image-20231226210818559

解压压缩包。可得 flag

image-20231226210853795

1
poctf{uwsp_c411f02n14_d234m1n9} 

# CRYPTO

# Missing and Missed

# WP

直接 BrainFuck

image-20231226085831273

# FLAG

1
poctf{uwsp_219h7_w20n9_02_f0290773n}

# Unquestioned and Unrestrained

# WP

直接 base64 解密

image-20231226090702698

# FLAG

1
poctf{uwsp_411_y0u2_8453_423_8310n9_70_u5}

# A Pale, Violet Light

# WP

ezRSA

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
#coding:utf-8

from Crypto.Util.number import *
import gmpy2
n = 34034827
p=5807
q=5861
e = 5039
message = "933969 15848125 24252056 5387227 5511551 10881790 3267174 14500698 28242580 933969 32093017 18035208 2594090 2594090 9122397 21290815 15930721 4502231 5173234 21290815 23241728 2594090 21290815 18035208 10891227 15930721 202434 202434 21290815 5511551 202434 4502231 5173234 25243036"
phi = (p - 1) * (q - 1)
d = gmpy2.invert(e, phi)
flag = ''
for i in message.split(" "):
m = gmpy2.powmod(int(i), d, n)
flag += str(long_to_bytes(m))[2:3]
print(flag)
#poctf{uwsp_533k 4nd y3 5h411 f1nd}

# FLAG

1
poctf{uwsp_533k_4nd_y3_5h411_f1nd}