[随波逐流]CTF Flags

   [随波逐流]CTF Flags

软件版本:v1.0.0   数据版本: v20260201
返    回

picoCTF

 广告模块
ID: 371
标题: picoCTF
描述: The it team are pretty sure that the headmaster got hacked again when\ \ they found a stranged device attached to his PC.\n> Here is a memory dump, identify\ \ the CVE used by the hacker, along with the username:password used for persistence.\> Flag format: shellmates{CVE-xxxx-yyyy:username:password} **Author**: Chih3b
类型: MISC
网站: bugku
题目链接: https://ctf.bugku.com/challenges/detail/id/499.html
赛事: HackINI2023
年度: 2023
Flag值: picoCTF{p}
writeup: https://albert-notes.github.io/2023/03/30/picoctf-2023/
picoCTF{proxies_all_the_way_01e748db}
https://albert-notes.github.io/2023/03/30/picoctf-2023/
picoCTF{53rv3r_53rv3r_53rv3r_53rv3r_53rv3r}
https://www.cnblogs.com/sesmof/p/17992374
picoCTF{grep_is_good_to_find_things_5af9d829}
https://jishuzhan.net/article/1903749889698377729
答案错误,我要更正