[随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 ctfshow MISC.月饼杯 misc2_洗寰瀛 flag{TriG1aviAn_Techn0lo9y} https://blog.csdn.net/hiahiachang/art... 月饼杯 3351
2 NSSCTF C [NSSRound#28 Team]来做算术题叭 NSSCTF{WeLcoMe_T0_the_Rand0m_W0rld} https://blog.csdn.net/weixin_57622773... NSSRound#28 12548
3 BUUCTF Reverse [GUET-CTF2019]re flag{e165421110ba03099a1c039337} https://www.cnblogs.com/zzkkk1h/p/18130326 GUET-CTF2019 6773
4 NSSCTF CRYPTO [CryptoCTF 2024]Nabat 验证后的网址 CCTF{0p71M!5TiC_rEpR3SenT4t!0n... CryptoCTF 14097
5 BUUCTF Misc 谁赢了比赛? flag{shanxiajingwu_won_the_game} https://blog.csdn.net/weixin_42487326... - 8883
6 BUUCTF Real [Jboss]CVE-2017-7504 JBoss AS 4.x及之前版本的JbossMQ实现中,JMS over HTTP Invocation Layer的HTTPServerILServlet.java文件存在反序列化漏洞(CVE-2017-7504)。攻击者可通过发送特制的序列化数据执行任意代码。影响范围为JBoss AS 4.x及之前版本。复现步骤包括使用ysoserial生成payload(如CommonsCollections5链),通过curl向/jbossmq-httpil/HTTPServerILServlet路径发送二进制数据,成功后可反弹shell或执行命令。修复方法包括升级至JBoss AS 5.x及以上版本、禁用JMS over HTTP Invocation Layer或限制HTTPServerILServlet的访问权限 4 5。 https://blog.csdn.net/YouthBelief/art... Jboss 6954
7 ctfshow WEB入门.反序列化 web258 O%3A%2B11%3A%22ctfShowUser%22%3A3%3A%7Bs%3A8%3A%22username%22%3Bs%3A3%3A%22123%22%3Bs%3A8%3A%22password%22%3Bs%3A3%3A%22123%22%3Bs%3A5%3A%22class%22%3BO%3A%2B8%3A%22backDoor%22%3A1%3A%7Bs%3A4%3A%22code%22%3Bs%3A23%3A%22system%28%22cat+flag.php%22%29%3B%22%3B%7D%7D https://www.cnblogs.com/wzzkaifa/p/19033795 反序列化 3548
8 BUUCTF Crypto [BJDCTF2020]easyrsa BJD{Advanced_mathematics_is_too_hard!!!} https://www.codeleading.com/article/4... BJDCTF2020 5996
9 bugku MISC LedMatrix Securinets{1nv4l1d_sh4r3_w4_s0nz41_suru!} https://sias2701.github.io/securinets... SecurinetsFriendly2022 2015
10 CTFHUB Reverse 42 flag{ed82ab5-5c7a-da78-b7a8-d2f5fbef453} https://www.wangonc.com/index.php/202... 新春战疫网络安全公益赛 10043