Writeup
Crypto
Chinese
FlyDragon
下載 passwd 跟 shadow 檔案
這兩個檔案和一個 linux 帳號有關
題目名稱 Johnny
提示這題可以使用 John the ripper 工具解題
$ unshadow passwd shadow > unshadow
$ john --format=crypt unshadow
成功取得帳號與密碼
Johnny:passw0rd:1001:1001::/home/Johnny:/bin/sh
$ nc lotuxctf.com 30005
用取得的帳號密碼登入後即可取得 flag
[name=FlyDragon]
May 28, 2025[name=FlyDragon]
May 28, 2025在 LoTuX 平台上取得 2000 分以上
Apr 4, 2025[name=FlyDragon] Step.1 By observing output.txt and executing the code, it can be inferred that the program flag.exe will output the flag after shuffling it. Step.2 By examining main() using Ghidra, it can be discovered that this program reads in the contents of flag.txt and outputs them after performing specific swaps in a particular order. order = [5, 13, 0, 12, 1, 16, 3, 2, 8, 7, 15, 4, 6, 17, 11, 10, 9]
Nov 1, 2023or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up