随波逐流信息安全网 www.1o1o.xyz

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 CTFHUB Web Love Math $pi=base_convert(37907361743,10,36)(dechex(1598506324));(pi)pi((pi){pi}((pi)pi((pi){cos})&pi=system&cos=cat%20/flag.php https://blog.csdn.net/weixin_73904941... CISCN 9975
2 bugku Reverse 杰瑞的箱子 flag{123456789} https://blog.csdn.net/qq_51600802/art... bugku 2867
3 NSSCTF 安卓逆向 [HNCTF 2022 WEEK2]Easy_Android NSSCTF{6d5e7a3c} ... HNCTF 10882
4 CTFHUB 网鼎杯 rua https://blog.csdn.net/cccchhhh6819/ar... 网鼎杯 9890
5 NSSCTF JAIL [NSSRound#29 Basic]东北jail https://blog.csdn.net/2301_80160378/a... NSSRound#29 13044
6 封神台 WEB 变量覆盖+弱类型(考点:变量覆盖、弱类型、复杂变量) - https://bbs.zkaq.cn/t/6246.html#CTF-105 - 15028
7 NSSCTF OffByNull [巅峰极客 2022]smallcontainer [巅峰极客 2022]smallcontainer的解题过程涉及利用off-by-null漏洞修改chunk头部信息实现堆合并,最终通过覆盖__free_hook为system函数获取shell。验证链接为:https://blog.csdn.net/A13837377363/article/details/138168210 ... 巅峰极客 11638
8 ctfshow 电子取证 JiaJia-PC-1 ctfshow{769a5b735409a2697086e68df511495f} https://blog.csdn.net/jiming_wue/arti... - 4491
9 bugku MISC pyfmt-1 The flag can be obtained by uploading a file with a specially crafted filename that, when base64 encoded, resolves to ////flag https://ctf.bugku.com/writeup/detail/... BSidesAlgiers2k21Finalschals 1029
10 春秋云境 WEB CVE-2019-7580 https://blog.csdn.net/m0_65150886/art... 春秋云境 14689