前言:本次初赛题目还是很简单的,附件后台私信
通关获取flag
有两段通关第一段发现Post请求
判断是密码 :192.168.30.234

bdb8e21eace81d5fd21ca445ccb350715a76f6751576dbe1af49328aa1d2d2bea16ef62afa3a7c616dbdb8e21eace81d5fd21ca445ccb35071第二段访问http协议 找到一串raw数据
找到一串字符串 rc4解密即可!
flag:{welcome to beijing}
binwalk -e 分离得到压缩包里面有加密flag.txt
继续分析数据包在http数据流
得到密码:25ming@ 得到一串Md5 进行碰撞即可
8fa14cdd754f91cc6554c9e71929cce72db95e8e1a9267b7a1188556b2013b330cc175b9c0f1b6a831c399e269772661b2f5ff47436671b6e533d8dc3614845df95b70fdc3088560732a5ac135644506b9ece18c950afbfa6b0fdbfa4ff731d32510c39011c5be704182423e3a695e91e1671797c52e15f763380b45e841ec32b14a7b8059d9c055954c92674ce600326f8f57715090da2632453988d9a1501bcfcd208495d565ef66e7dff9f98764da03c7c0ace395d80182db07ae2c30f034e358efa489f58062f10dd7316b65649eb14a7b8059d9c055954c92674ce60032c81e728d9d4c2f636f067f89cc14862ce1671797c52e15f763380b45e841ec324a8a08f09d37b73795649038408b5f334c614360da93c0a041b22e537de151eb4b43b0aee35624cd95b910189b3dc231e1671797c52e15f763380b45e841ec32b14a7b8059d9c055954c92674ce60032e1671797c52e15f763380b45e841ec328d9c307cb7f3c4a32822a51922d1ceaa4a8a08f09d37b73795649038408b5f334b43b0aee35624cd95b910189b3dc23157cec4137b614c87cb4e24a3d003a3e083878c91171338902e0fe0fb97a8c47ae358efa489f58062f10dd7316b65649e865c0c0b4ab0e063e5caa3387c1a8741d95679752134a2d9eb61dbd7b91c4bcc7b8b965ad4bca0e41ab51de7b31363a19033e0e305f247c0c3c80d0c7848c8b39033e0e305f247c0c3c80d0c7848c8b39033e0e305f247c0c3c80d0c7848c8b3cbb184dd8e05c9709e5dcaedaa0495cf
flag{The_m0st_2ecUre_eNcrYption!!!}
#artContent h1{font-size:16px;font-weight: 400;}#artContent p img{float:none !important;}#artContent table{width:100% !important;}