[GWCTF 2019]枯燥的抽奖 2024-05-31- 2024-09-24 651- 3m- [GWCTF 2019]枯燥的抽奖(php_mt_seed脚本&伪随机数生成)我们首先打开页面源码,发现一串关键代码题解
GYCTF2020 FlaskApp 2024-05-30- 2024-10-27 2.9k- 14m- [GYCTF2020]FlaskApp(ssti jinja2模块/pin码)非预期解我们往解密页面里随便填写,会进入debug页面 刷题笔记sstipin码
红明谷CTF 2021 write_shell 2024-05-30- 2024-09-24 558- 2m- [红明谷CTF 2021]write_shell(短标签&代码审计)打开页面,开始代码审计 刷题笔记题解
CISCN2019 华北赛区 Day1 Web2 ikun 2024-05-30- 2024-09-24 1.4k- 5m- [CISCN2019 华北赛区 Day1 Web2]ikun(jwt和pickle)首先先注册账号,登录 我们在首页发现提示信息,需要我们买到lv6 刷题笔记picklejwt
CSCCTF 2019 Qual FlaskLight 2024-05-29- 2024-09-24 537- 2m- [CSCCTF 2019 Qual]FlaskLight(ssti)进入页面后,我们先查看源码 刷题笔记ssti
Zer0pts2020 Can you guess it? 2024-05-29- 2024-09-24 581- 2m- [Zer0pts2020]Can you guess it?点开source,发现源码 12345678910111213141516171819202122<?phpinclude 'config.php'; // FLAG is defined in config.phpif (preg_match('/config\.php\/*$/i', $_SERVER['PHP_SELF'])) { exit("I don't know what you are thinking, but I won't let you read it :)");}if (isset($_GET['source'])) { highlight_file(basename($_SERVER['PHP_SELF'])); exit();}$secret = bin2hex(random_bytes(64));if (isset($_POST['guess'])) { $guess = (string) $_POST['guess']; if (hash_equals($secret, $guess)) { $message = 'Congratulations! The flag is: ' . FLAG; } else { $message = 'Wrong.'; }}?> 然后开始进行代码审计 根据题目提示,flag在config.php中,所以我们的目的是要读取config.php 刷题笔记题解
FBCTF2019 RCEService 2024-05-29- 2024-09-24 492- 2m- [FBCTF2019]RCEService用json格式输入{“cmd”:”ls”} 我们再查看源码(可能比赛给了源码吧,我是没找到) 刷题笔记题解
高明的黑客 2024-05-24- 2024-09-24 585- 2m- [强网杯 2019]高明的黑客打开页面,下载www.tar.gz文件,文件里是几千个php文件,根本没法看,不过里面包含很多shell 刷题笔记题解