随波逐流信息安全网 www.1o1o.xyz

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 ctfshow PWN入门.堆利用-前置基础 pwn136 pwn136的答案是直接输入4即可获取flag https://blog.csdn.net/KaliLinux_V/art... 堆利用-前置基础 4994
2 BUUCTF Reverse [FlareOn3]NoName flag{sh00ting_phish_in_a_barrel@flare-on.com} https://blog.csdn.net/mcmuyanga/artic... FlareOn3 6643
3 BUUCTF Reverse [RCTF2019]DontEatMe flag{db824ef8605c5235b4bbacfa2ff8e087} https://blog.csdn.net/qq_41853048/art... RCTF2019 7389
4 xuenixiang.com Crypto part_des https://blog.csdn.net/jcbx_/article/d... 全国大学生信息安全大赛ciscn_2019 15307
5 bugku MISC 悲伤的故事 flag{zijizuoyibianbalangou} https://blog.csdn.net/u010418732/arti... bugku 2910
6 ctfshow PWN入门.堆利用 pwn162 CTFshow PWN162的解题过程涉及堆利用技巧,包括fastbin_double_free、unsortedbin_attack、IO_FILE泄露(通过_IO_2_1_stdout)、house of spirit和UAF漏洞。具体步骤包括通过unsortedbin_attack修改fd指针,利用double_free将伪造的chunk挂入fastbins,劫持IO_FILE结构体的flags字段(0xfbad1800)以触发IO_FILE漏洞泄露libc地址,最终通过house of spirit修改realloc_hook或malloc_hook为one_gadget地址获取shell。完整EXP代码和详细分析可参考CSDN博客 1。 https://blog.csdn.net/2301_79252433/... 堆利用 5020
7 XCTF Crypto cr3-what-is-this-encryption ALEXCTF{RS4_I5_E55ENT1AL_T0_D0_BY_H4ND} https://blog.csdn.net/l8947943/articl... CTF 9530
8 BUUCTF Pwn pwnable_otp https://blog.csdn.net/wxh0000mm/artic... - 8523
9 bugku MISC nothing-to-see tjctf{w0w_1m_g0od_4t_st3g0n0gr4phy} https://ctftime.org/writeup/37611 TJCTF2023 1776
10 ctfshow _萌新 web7 ctfshow{flag_value} https://blog.csdn.net/weixin_58052886... - 3070