[随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
序号 Website Type Title Value Writeup Competition Id
1 NSSCTF 内存取证 [OtterCTF 2018]Path To Glory 2 Hum@n_I5_Th3_Weak3s7_Link_In_Th3_Ch@in https://www.cnblogs.com/MiaCTFer/p/18... OtterCTF 11168
2 NSSCTF 逆向 [0ctf 2016]momo 0ctf{m0m0_15_50_51l3n7}_3 https://github.com/angr/angr-doc/tree... 0ctf 13451
3 BUUCTF Real [PHP]CVE-2019-11043 PHP远程代码执行漏洞CVE-2019-11043的成因是Nginx配置中fastcgi_split_path_info在处理包含换行符(%0a)的请求时导致PATH_INFO为空,结合PHP-FPM的逻辑缺陷可触发远程代码执行。该漏洞影响Nginx+PHP-FPM环境且PHP版本为7.0-7.3的场景 1 4。验证复现步骤包括:1. 使用Vulhub搭建漏洞环境;2. 通过phuip-fpizdam工具发送恶意请求;3. 构造参数(如?a=cat%20/etc/passwd)验证命令执行 1 4。 https://www.cnblogs.com/mr-ryan/p/19058884 PHP 7351
4 BUUCTF Crypto [CFI-CTF 2018]Chinese_Food CFI{cHiN35E_fUD_15_yUUUm} https://github.com/CFI-UL/2018-CFI-CT... CFI-CTF 2018 6083
5 xuenixiang.com Web web3 - https://www.xuenixiang.com/forum.php?... xuenixiang_2019 15311
6 XCTF Pwn 4-ReeHY-main-100 堆溢出利用fastbin attack和unlink漏洞获取shell https://blog.csdn.net/weixin_52640415... - 9154
7 ctfshow 群友挑战.RealWorldRe TH185 ctfshow{ASAHIMARUEFU} https://www.dr0n.top/posts/37dc4cfa/ RealWorldRe 4700
8 NSSCTF 安卓逆向 [NSSCTF 3rd]EverythingFake https://github.com/SHangwendada/-NSS3... NSSCTF 14116
9 XCTF Reverse EASYHOOK flag{Ho0k_w1th_Fun} https://blog.csdn.net/weixin_61154173... XCTF 9357
10 bugku MISC pyfmt-1 The flag can be obtained by uploading a file with a specially crafted filename that, when base64 encoded, resolves to ////flag https://ctf.bugku.com/writeup/detail/... BSidesAlgiers2k21Finalschals 1029