随波逐流信息安全网 www.1o1o.xyz

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 vulfocus WEB youphptube SQL注入 (CVE-2019-5120) https://www.clouddefense.ai/cve/2019/... - 16574
2 CTFHUB Web Love Math $pi=base_convert(37907361743,10,36)(dechex(1598506324));(pi)pi((pi){pi}((pi)pi((pi){cos})&pi=system&cos=cat%20/flag.php https://blog.csdn.net/weixin_73904941... CISCN 9975
3 NSSCTF 密码爆破 [SWPUCTF 2022 新生赛]Crack Me NSSCTF{a80e8ac7-2f4a-418e-b81e-a9e15c3c0d28} https://blog.csdn.net/weixin_46631585... SWPUCTF 10938
4 CTFHUB 网鼎杯 最好的语言 flag{ca201ed0-9e07-11e8-b6dd-000c29dcabfd} https://blog.csdn.net/u010418732/arti... 网鼎杯 10167
5 NSSCTF 动态调试 [HNCTF 2022 WEEK2]Try2Bebug_Plus https://blog.csdn.net/YYueHua5/articl... HNCTF 11020
6 NSSCTF 弱比较 [NSSRound#16 Basic]了解过PHP特性吗 https://iamblackcat.com/posts/nssctf_... NSSRound#16 10838
7 BUUCTF Pwn hitcontraining_magicheap hitcontraining_magicheap的解题过程通过unsorted bin attack覆盖magic值实现get shell,关键步骤包括创建三个chunk、利用堆溢出修改bk指针、触发unsorted bin脱链操作写入magic值,最终输入4869触发后门 1 3。验证后的网址为:https://blog.csdn.net/mcmuyanga/article/details/112302849 https://blog.csdn.net/zwb2603096342/a... - 8329
8 BUUCTF Web [极客大挑战 2019]PHP flag{b18bb0c2-8084-4e65-a402-f1803a87f80d} https://blog.csdn.net/rumil/article/d... 极客大挑战 2019 7947
9 NSSCTF 古典密码 [柏鹭杯 2021]据说有些数据可以进行多重编码? flag{ISEC-42115cad00f8c4a0495bffa97d2ca3a8} https://zhuanlan.zhihu.com/p/42813548... 柏鹭杯 11248
10 XCTF MISC challenge_how_many_Vigenère LCTF{osqjdcsvzjxfkoutsvdmoqcegnqc} https://blog.csdn.net/weixin_44604541... CTF 9006