RCTS CERT CTF2021
Web
Some type of juggling
#web#php
Can you solve this challenge?
URL:http://challenges.defsoc.tk:8080
Flag format: flag{string}
1 |
|
md5后的结果要一样,可以用0e绕过,而且hash与value之间的关系是弱等,所以hash不能是数字。var_dump(md5(‘240610708’) == md5(‘QNKCDZO’));
解题
1 |
|
Exclusive access
#web#owasp10
We discovered a protected page. Can you bypass it?
URL:http://challenges.defsoc.tk:9999
Flag format: flag{string}
抓包得到
1 |
|
url解码再base64解码得到guest,将admin逆操作得到YWRtaW4%3D,传过去得到flag
1 |
|
It is Magic after all
#web#php
Can you do some magic in this page?
URL:http://challenges.defsoc.tk:3000
Flag format: flag{string}
1 |
|
exp
1 |
|
Payload:
1 |
|
Forensics
Hiding in plain sight
#forensi#images
I think there is something fishy about this image.
Can you help me out?
Flag format: flag{string}
010文件尾就是flag
1 |
|
Welcome to the challenge
#forensics#images
Welcome to the RCTS Challenge!
Can you find the flag?
Flag format: flag{string}
直接foremost分离图片
1 |
|
About us
#forensics#pdfs
This challenge is about the RCTS CERT at FCCN.
Can you get the flag?
Flag format: flag{string}
strings查看:
1 |
|
Keyp it universal
#foren#pcap
We intercepted a strange communication which we believe has important information inside.
Can you retrieve the information from it?
Flag format: flag{string}
Regex: flag{[0-9a-z_]+}
USB键盘流量
1 |
|
加冒号
1 |
|
keyborad.py
1 |
|
得到
1 |
|
最终flag
1 |
|
Maybe the helper can help*
You might not see it, but a flag lies within.
Flag Format: flag{string}
the-jetsons-family.jpg
参考其他人的wp:
1 |
|
OSINT
Welcome to Lisbon!
Oh, some activists defaced a Victoria Secret’s store.
Find out which was the model whose photo was damaged.
Flag format: flag{firstname_surname}
社工题
welcome_to_lisbon.jpg
从题目名字我们可以知道这家商店位于葡萄牙的里斯本,谷歌搜索 Victoria Secret Lisbon可以找到店铺位置
题目所给图片被打码的就是这个模特,搜索Victoria Secret model可以找到是这位模特
阿德瑞娜·利玛 (Adriana Lima)
1 |
|
Mission
Something Suspicious
#mission#logging
We have detected a strange activity inside our network and manage to get some logs from it.
Can you see what happened and if there was a host compromised?
Flag format: flag{string}
ftp.log
ssh.log
1 |
|
最终flag
1 |
|
PWN
Well hello there
#pwn#c
We initiated the development of a bot. So far it greets you by your name. Can you test it?
Access: nc challenges.defsoc.tk 22228
Flag format: flag{string}
拖入IDA查看main函数
1 |
|
缓冲区溢出,name超过 76 个字符即可
1 |
|
web手做出的第一个pwn题
Reverse Engineering
You are not allowed
#reverse#c
Can you reverse this program and get us the flag?
Flag format: flag{string}
这个逆向也很简单,拖入IDA找到main函数,然后F5,可以看到sub_401242函数
1 |
|
找到sub_401242函数,同样F5
1 |
|
可以看到字符串Sup3rS3cr3tK3y#,输入即可得到flag
1 |
|
Crypto
A simple challenge
#crypto#encoding
We have intercepted the following message and we think it has a secret flag in it.
Can you decode it?
Flag format: flag{string}
secret_message.txt:
1 |
|
exp:
1 |
|
得到
1 |
|
Roman encryption
#crypto#cipher
We intercepted an encrypted communication that was meant to be delivered to a threat actor named Julius.
Apparently his name is the key to decipher this message.
Can you decipher it?
Flag format: flag{string}
1 |
|
https://quipqiup.com/令jdgl=flag
1 |
|
提交flag不对,继续查看题目提示,应该是带key的凯撒密码
解密网站:https://www.boxentriq.com/code-breaking/keyed-caesar-cipher
搜索 Julius得到全称Gaius Julius Caesar,即为key解密得到flag
1 |
|
Hextraordinary security
#crypto#encoding
We just found this garbage file.
Can you decode it and retrieve any useful information from it?
Flag format: flag{string}
hex转str
1 |
|
本博客所有文章除特别声明外,均采用 CC BY-SA 4.0 协议 ,转载请注明出处!