FlyDragon
用題目給的帳號登入
Learn More →
登入後可以看到三篇貼文,且三篇的標題都可以點擊跳轉至對應頁面
Learn More →
查看貼文,發現頁面為 post{index}.php
Learn More →
查看post0.php
取得第一段 flag
Learn More →
查看第三篇貼文,發現有編輯的按鈕,按下後得知僅有 admin
可以編輯貼文
Learn More →
嘗試 sql injection 登入網站
username : admin
password : ' or 1=1#
Learn More →
成功登入網站
Learn More →
查看第三篇貼文,發現沒有編輯按鈕,推測兩點
第一篇貼文的 Author 為 admin ,嘗試編輯貼文
Learn More →
取得 flag
[name=FlyDragon]
May 28, 2025[name=FlyDragon]
May 28, 2025在 LoTuX 平台上取得 2000 分以上
Apr 4, 2025[name=FlyDragon] Step.1 By observing output.txt and executing the code, it can be inferred that the program flag.exe will output the flag after shuffling it. Step.2 By examining main() using Ghidra, it can be discovered that this program reads in the contents of flag.txt and outputs them after performing specific swaps in a particular order. order = [5, 13, 0, 12, 1, 16, 3, 2, 8, 7, 15, 4, 6, 17, 11, 10, 9]
Nov 1, 2023or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up