[标题搜索]只能搜索题目标题,[综合搜索]支持多关键词多项目搜索(以空格分隔)。
| 序号 | Website | Type | Title | Value | Writeup | Competition | Id |
|---|---|---|---|---|---|---|---|
| 1 | ctfshow | PWN入门.堆利用-前置基础 | pwn136 | pwn136的答案是直接输入4即可获取flag | https://blog.csdn.net/KaliLinux_V/art... | 堆利用-前置基础 | 4994 |
| 2 | BUUCTF | Reverse | [FlareOn3]NoName | flag{sh00ting_phish_in_a_barrel@flare-on.com} | https://blog.csdn.net/mcmuyanga/artic... | FlareOn3 | 6643 |
| 3 | BUUCTF | Reverse | [RCTF2019]DontEatMe | flag{db824ef8605c5235b4bbacfa2ff8e087} | https://blog.csdn.net/qq_41853048/art... | RCTF2019 | 7389 |
| 4 | xuenixiang.com | Crypto | part_des | 无 | https://blog.csdn.net/jcbx_/article/d... | 全国大学生信息安全大赛ciscn_2019 | 15307 |
| 5 | bugku | MISC | 悲伤的故事 | flag{zijizuoyibianbalangou} | https://blog.csdn.net/u010418732/arti... | bugku | 2910 |
| 6 | ctfshow | PWN入门.堆利用 | pwn162 | CTFshow PWN162的解题过程涉及堆利用技巧,包括fastbin_double_free、unsortedbin_attack、IO_FILE泄露(通过_IO_2_1_stdout)、house of spirit和UAF漏洞。具体步骤包括通过unsortedbin_attack修改fd指针,利用double_free将伪造的chunk挂入fastbins,劫持IO_FILE结构体的flags字段(0xfbad1800)以触发IO_FILE漏洞泄露libc地址,最终通过house of spirit修改realloc_hook或malloc_hook为one_gadget地址获取shell。完整EXP代码和详细分析可参考CSDN博客 1。 | https://blog.csdn.net/2301_79252433/... | 堆利用 | 5020 |
| 7 | XCTF | Crypto | cr3-what-is-this-encryption | ALEXCTF{RS4_I5_E55ENT1AL_T0_D0_BY_H4ND} | https://blog.csdn.net/l8947943/articl... | CTF | 9530 |
| 8 | BUUCTF | Pwn | pwnable_otp | 无 | https://blog.csdn.net/wxh0000mm/artic... | - | 8523 |
| 9 | bugku | MISC | nothing-to-see | tjctf{w0w_1m_g0od_4t_st3g0n0gr4phy} | https://ctftime.org/writeup/37611 | TJCTF2023 | 1776 |
| 10 | ctfshow | _萌新 | web7 | ctfshow{flag_value} | https://blog.csdn.net/weixin_58052886... | - | 3070 |