随波逐流信息安全网 www.1o1o.xyz

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 bugku MISC Push and Pickle Push and Pickle无是构造一个绕过opcode检查的pickle payload,利用__reduce__方法触发check_flag函数。验证后的网址为: https://medium.com/@harryfyx/writeup-uiuctf-2024-push-and-pickle-cf821c49194f 该文章详细描述了通过修改pickle协议版本和指令流,使用未被禁止的op... UIUCTF2024 2419
2 NSSCTF MISC [D3CTF 2019]vera D3CTF{VeraCrypt_ISBN_13_digits_password} https://www.anquanke.com/post/id/193939 D3CTF 13078
3 NSSCTF CRYPTO [CryptoCTF 2021]Rima CCTF{_how_finD_7h1s_1z_s3cr3T?!} https://ctftime.org/writeup/29480 CryptoCTF 13312
4 qsnctf WEB EasyMD5 qsnctf{4682792f556a4b19afb4eacc6f2dd0c6} https://fanllspd.com/posts/14e77824/ 原创题 5504
5 qsnctf WEB baby rce SQCTF{e1d9e70dd5ca4689b4ab4cd9f4bafc26} https://blog.csdn.net/weixin_52040570... 第四届商师校赛 5525
6 BUUCTF Crypto [V&N2020 公开赛]Fast 题目的答案 https://blog.csdn.net/weixin_44017838... V&N2020 公开赛 7547
7 NSSCTF MISC [强网拟态 2022]secret_log flag{lfxWrTfILF5cdfxpUMvg9L7AbrQxC148} https://www.secpulse.com/archives/190801.html 强网拟态 13976
8 cyberstrikelab 目录遍历漏洞 CVE-2019-5418 CVE-2019-5418的漏洞答案为:通过构造路径穿越攻击(如../../../../etc/passwd{{)利用Ruby on Rails框架的render file参数解析缺陷,实现任意文件读取。验证后的网址为:https://www.cnblogs.com/Found404/p/14430016.html https://www.yisu.com/jc/500010.html cyberstrikelab 16979
9 qsnctf 应急专项 应急响应2-29 - https://blog.csdn.net/2303_80857229/a... 第二届“Parloo”CTF应急响应挑战赛 5683
10 NSSCTF ORW [NSSRound#9 Basic]MyMem [NSSCTF{86ed1ea3-aa00-455a-82a5-80fbd14876ee}] https://blog.csdn.net/2401_88087539/a... NSSRound#9 11265