--- title: Pingtung Hacker note tags: Security --- # Pingtung Hacker note 這是我在屏東大學屏東駭客(Pingtung Hacker)課程 資安課程的學習記錄、過程解法 **檔案在個人雲端硬碟** ## ph lesson 1 (21/3/4) 1. 本題目出自於BreakALLCTF。 本題FLAG標頭為 easyctf 。 strings hexedit 2. 本題目出自於MyFirstCTF。 本題FLAG標頭為 MyFirstCTF strings find | grep MyFirstCTF | grep -v {} 3. 本題目出自於MyFirstCTF。 本題FLAG標頭為 MyFirstCTF 。 objdump -M intel -d search | grep BYTE | cut -c 64-67 |xxd -r -p | grep My 4. strings CallMeMaybe 看main裡發現他有一個地方直接跳過兩個函式 (je) 74 改成 jne (75) 或 0000無效 %! xxd %! xxd -r vim CallMeMaybe # ph lesson 2 (21/3/11) ## GDB 1. DanceMonkey 1 ./DanceMonkey 2 strings DanceMonkey 3 objdump -d intel DanceMonkey 找到可疑副含式 (示意圖)  4 gdb DanceMonkey break main run jump *找到可疑副含式名稱 2. BadGuy 1 跟前面一模一樣 2 發現有不能執行的城市在第5行 3 設breakpoint在那可疑副含式最後一行 break *可疑副含式最後一行 4 run 5 jump *可疑副含式第一行 ## ghidra https://ghidra-sre.org/ 1. Note(adder) 本題目出自於BreakALLCTF。 本題FLAG標頭為 easycyf 。 2. (LuckyGuess) Disclaimer: This challenge binary was sourced from BreakAllCTF. What variable was the input stored in after Guess? according to Ghidra? Format: {variable_name}! 3. (LuckyGuess - 2) At what address was the function rand() called? How many iterations did the first for loop go for? Format: {0xadd;iterations}    # ph lesson 3 (21/3/11) 1. stack EZ69 nc 10.100.96.3 30001 let it overflow (input > 69) ## pwn 2. nc 10.100.96.3 30002 Note 本題目出自於MyFirstCTF。 本題FLAG標頭為 PH 。  3. nc 10.100.96.3 30003 Note 本題目出自於BreakALLCTF。 本題FLAG標頭為 PH 。   
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up