解法:
Flag:
題目說明:
Hack those creepy rats.
解法:
進入網頁後看Source Code
發現一段JS
Get /api.php?get=
發現會Response一段JSON
繼續Get ?get=/etc/passwd
會Response /etc/passwd裡的資料
推測是Command Injection OR Local File Include
繼續嘗試 ?get=';ls'
Response:
可以確定是CMDi
那就嘗試找找Flag在哪
Get ?get=';ls /'
Response:
發現有個可疑檔案
推測它就是 Flag
嘗試 Cat 它
Get ?get=';cat /5qu1rr3l_15_4_k1nd_0f_b16_r47.txt'
Flag:
題目說明:
Let’s dive deep again this year.
進入網頁發現有個HyperLink
點進去後出現Hint
看URL發現是透過Get /?path=hint.txt
推測有LFI 的問題
嘗試Get /?path=index.php
成功看到Source Code
Hint說要找其他內網機器尋找上面的Flag
所以要嘗試看看機器的/etc/host
透過Source Code發現path有上RE
要想辦法Bypass它
嘗試用Base64 Bypass
Payload:?path=php://filter/convert.base64-encode/resource=/etc/hosts
Response:
Base64 Decode:
發現Host是172.22.0.3
那嘗試看看.2和.4有沒有東西
發現.2有東西
嘗試找找Flag
Payload:?path=http://172.22.0.2/flag
Flag:
題目說明:
How to read that flag?
https://snake.ais3.org/
Source Code:
似乎非正規解
解法:
Python Serialization and Base64 code
Quest Python Test Code
Payload
Flag:
題目說明:
Do you know why is this challenge called Rhino?
https://rhino.ais3.org/
/package.json
/chill.js
題目說明:
Flag is inside the database.
IMPORTANT
/?source
題目說明:
That is easy-peasy challenge and even my grandma can do.
nc 60.250.197.227 10000
Challenge environment: Ubuntu 18.04
檔案:
bof-767fdf896cf9838c0294db24eaa1271ebf15a6e638a873e94ab9682ef28464b4
解法:
Flag:
題目說明:
Welcome to Rick and Morty’s crazy world. Say something!
Rick’s stupid nonsense catchphrase is “wubba lubba dub dub”.
nc 60.250.197.227 10001
Challenge environment: Ubuntu 18.04
檔案:
nonsense-8ccbca2ca7f8825c843596a09c0806275a5b3fdf1c6c570bc0276fb0afc9210c
題目說明:
The Portal Gun is a gadget that allows the user(s) to travel between different universes/dimensions/realities.
Try to get the shell and avoid the hook!
nc 60.250.197.227 10002
Challenge environment: Ubuntu 18.04
檔案:
hook.so-997c848132f9fae3a5ffdb0edf7c9071a0dcdebb99c116c5bd011efd28c942ae
portal_gun-43fcd0f6ae670ddb11a66bbfbca721410941ee30a5d1d802a6f509bcf7a765ac
libc.so.6-cd7c1a035d24122798d97a47a10f6e2b71d58710aecfd392375f1aa9bdde164d
題目說明:
Welcome to Morty school _
We need you to teach Morty. And then you can get the shell!
nc 60.250.197.227 10003
Challenge environment: Ubuntu 18.04
檔案:
morty_school-d97056f03b991d718b35ef47fcfcaeb15f971b60b58d0eb0fcd8dcf3a3a11a99
libc.so.6-cd7c1a035d24122798d97a47a10f6e2b71d58710aecfd392375f1aa9bdde164d
題目說明:
Death Crystals are crystals found on Forbodulon Prime that allow those who wield it to foresee their death in multiple possible future scenarios.
Before you died, you can see the message I left.
nc 60.250.197.227 10004
Challenge environment: Ubuntu 18.04
檔案:
death_crystal-5c5baf0fb1ef4690eb472dc579403af6248be7a6815a89906b2c22ce55d73529
題目說明:
The Mr. Meeseeks Box is a gadget that creates a Mr. Meeseeks for the purpose of completing one given objective.
Just keep your requests simple. They are not Gods.
nc 60.250.197.227 10005
Challenge environment: Ubuntu 18.04
檔案:
meeseeks_box-46937361847a6ed6df9ee20eea7eb59b70db5d9779ca2b94e481bc57fd130873
libc.so.6-cd7c1a035d24122798d97a47a10f6e2b71d58710aecfd392375f1aa9bdde164d
題目說明:
很好…你很腦殘嗎…敢這樣講刀劍神域…我死也不會放過你 我..要..殺死…你..
author: terrynini
檔案:
TsaiBro
TsaiBroSaid
解法:
兩種解題方法
密碼表:
密文:
Flag:
題目說明:
CTF player,
我要挑戰你, I'm gonna challenge you!!
ZR
這是我的室友兼 lab 同學,
他已經考過金框暴龍天,他是個旋鈕人,
不像你是個敲鍵盤的,
所以我要測測你的程度到哪裡,
就用 ZR 的大一 project 來決勝負吧!!
得到 Full Combo 來讓我刮目相看!!
author: terryninien
檔案:
Fallen_Beat.zip
解法:
*注:hell.txt譜面,頭兩行不要
Code:
Flag:
解法:
Flag:
題目說明:
長·島·冰·茶
我·的·最·愛
長·島·冰·茶
超·爽·口·感
咚咚咚ㄎㄧㄤ
咚咚咚ㄎㄧㄤ
咚咚咚ㄎㄧㄤ
我真的好ㄎㄧㄤ
author: terrynini
題目說明:
你好啊愛德華大哥哥,真的沒想到你可以到第二十五層來呢!
不過就到這裡為止了,
接下來就由我 反重力三頭鎖鏈康妮·解放·緋紅 來做你的對手!
author: terrynini
檔案:
Uroboros
題目說明:
Brontosaurus peek at last year’s problems with a long neck and picked up “KcufsJ”.
檔案:
KcufsJ
解法:
字串反轉之後丟上F12的工具即可
Flag:
題目說明:
Tyrannosaurus-rex is an nihilist.
檔案:
prob
解法:
兩種解題方法
密碼表:
密文:
Flag:
題目說明:
Don’t poke the puffer, it is poisonous.
nc 60.250.197.227 12001
檔案:
prob.py
user.pickle
題目說明:
BB84 quantum key distribution has 8 main directions,
just like a cute octopus A __ A.
題目說明:
I can’t see the flag. Where is it?
解法:
用線上工具交叉比對
有些特殊符號要注意一下
Flag:
題目說明:
Students who fail to summon will be dropped out.
檔案:
Karuego_0d9f4a9262326e0150272debfd4418aaa600ffe4.png
解法:
透過binwalk可以看到是個zip檔並且有加密
使用dd將隱藏的Zip抽出
利用fcrackzip可以爆破密碼
之後就可以在裡面的圖片上看到flag
Flag:
題目說明:
Here is your flag. Oops, my bad.
解法:
使用這個線上工具將尚可解讀的部分先仿畫出來
再利用右上Tools > Extract QR Information 強制將資訊破解出來
Flag:
題目說明:
Spell you flag and fight with me.
PS. flag is printable characters with AIS3{…}
nc 60.250.197.227 11001
解法:
寫Code爆破
Flag:
題目說明:
Don’t cheat!!! I’m wathcing you!!
nc 60.250.197.227 11000
檔案:Shichirou_1869833657e9fef14ad2742e59bb96f4630db429.py
題目說明:
I did nothing special today. >_<
Defender: Malware Detected !!
WTF, someone is monitoring me ?!
There are several encrypted data sent, but they looks a little be weird ?
Keyword: malware, monitor, encrypted data
The two malicious conversations sent exactly the same things. The connection between malware and C&C are broken one time.
Malware Design Principle
Communication
There are several files sent together in each conversation. As a malware developer, how would you design the communication between malware and C&C ?