加载中...
avatar
文章
32
标签
13
分类
5
主页
分类
标签
时间轴
友链
关于笔者
LogoYxing2025ISCC-WP
搜索
主页
分类
标签
时间轴
友链
关于笔者

2025ISCC-WP

发表于2025-05-10|更新于2025-05-10|赛题wp
|总字数:6|阅读时长:1分钟|浏览量:
文章作者: yxing
文章链接: http://yxing-1.github.io/2025/05/10/2025ISCC-WP/
版权声明: 本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明来源 Yxing!
比赛
cover of previous post
上一篇
ACTF-WP
WEBnot so web 1题目先随便注册登录进入后base64解码得到源码 import base64, json, timeimport os, sys, binasciifrom dataclasses import dataclass, asdictfrom typing import Dict, Tuplefrom secret import KEY, ADMIN_PASSWORDfrom Crypto.Cipher import AESfrom Crypto.Util.Padding import pad, unpadfrom flask import ( Flask, render_template, render_template_string, request, redirect, url_for, flash, session,)app = Flask(__name__)app.secret_key = KEY@dataclass(kw_only=True)class APPUser: name:...
相关推荐
cover
2025-01-13
2019极客大挑战-WP
[极客大挑战 2019]EasySQL 直接万能密码闭合后登录即获得flag 闭合后语句username=1&password='1' or 1=1#' [极客大挑战 2019]LoveSQL使用万能密码尝试 username=1&password=1' or 1=1# 有回显位置了,且题目提示flag放在了其他位置,下述payload的password均为上图数据 username=admin' order by 3# order by判断列数,列数为4时报错username=a' union select 1,2,3#用不存在的username才能找到回显位,不然使用admin只会重复上图,回显位为2,3username=a' union select 1,(database()),3#库名为geekusername=a' union select 1,(select group_concat(table_name) from...
cover
2025-04-26
ACTF-WP
WEBnot so web 1题目先随便注册登录进入后base64解码得到源码 import base64, json, timeimport os, sys, binasciifrom dataclasses import dataclass, asdictfrom typing import Dict, Tuplefrom secret import KEY, ADMIN_PASSWORDfrom Crypto.Cipher import AESfrom Crypto.Util.Padding import pad, unpadfrom flask import ( Flask, render_template, render_template_string, request, redirect, url_for, flash, session,)app = Flask(__name__)app.secret_key = KEY@dataclass(kw_only=True)class APPUser: name:...
cover
2025-03-22
2025polarctf春季个人赛-WP
CRYPTObeginnerfrom Crypto.Util.number import long_to_bytes# 给定的结尾数值suffix = 16732186163543403522711798960598469149029861032300263763941636254755451456334507142958574415880945599253440468447483752611840# 验证suffix是否是2^125的倍数bits_125 = 1 << 125if suffix % bits_125 != 0: raise ValueError("Suffix is not divisible by 2^125, no solution exists.")# 计算S' = suffix / 2^125s_prime = suffix // bits_125# 计算模数5^125mod_5_125 = 5 ** 125# 计算2^9875在模5^125下的逆元inv_2_9875 = pow(2, -9875,...
cover
2025-01-23
2024BaseCTF-WP
HTTP 是什么呀常规的GET,POST传参,改cookie,referer,UA,IP,注意这里如果是GET传参要传入%00,就要先url编码一次,即传入%2500,因为浏览器会自动进行一次url解码 GET /?basectf=we1c%2500me POST Base=fl@gCookie: c00k13=i can't eat itUser-Agent: BaseReferer: BaseX-Forwarded-For:127.0.0.1 base64解码即可 喵喵喵´•ﻌ•`直接GET传参 DT=system('ls /');DT=system('cat /flag'); md5绕过欸直接数组绕过即可,注意第二层为强比较,也可用数组绕过 GET:name[]=1&name2[]=2Post:password[]=3&password2[]=4 A Dark Room源码 upload写个一句话木马存为1.php上传,bp抓包修改文件类型为Content-Type:...
cover
2025-03-30
ISCTF2023复现
1z_Ssql(sql注入)username=1' or 1=1# //illegal words!username=1'# //用户名或密码错误username=-1' or 1 order by 3# //回显You are so smart! Let me give you a hint ↓ 5aSn5L2s77yM5L2g6L+Z5LmI6IGq5piO5bqU6K+l5LiN6ZyA6KaBaGludOWQpz8=,但是没用,说明等号被过滤了username=-1' or 1 order by 4# //用户名或密码错误username=-1' union select 1,2,3# //illegal words!username=union //illegal words!,尝试后双写和大写都不能绕过username=select //用户名或密码错误尝试布尔盲注username=0' or if(substr(database(),1,1)=c,true,false) ...
cover
2024-12-02
Hackergame复现
签到 错误输入一次后在url框中发现false,修改为true后获得flag 喜欢做签到的 CTFer 你们好呀题目要求ctf战队招新网站,在承办单位中找到,进去后为Linux终端 flag1通过help命令找出可用命令,再用ls -la命令找到隐藏的.flag文件,cat .flag获得 flag{0k_175_a_h1dd3n_s3c3rt_f14g___please_join_us_ustc_nebula_anD_two_maJor_requirements_aRe_shown_somewhere_else} flag2输出.oh-you-found-it的内容,提示考虑其他目录,进入Awards时提示要管理员权限,但是sudo...
目录
  1. WBE
    1. 哪吒的试炼
    2. 回归基本功
    3. ShallowSeek
  2. MISC
    1. 取证分析
  3. MOBILE
    1. 邦布出击
©2024 - 2025 By yxing
框架 Hexo|主题 Butterfly
搜索
数据加载中