| ID: | 371 |
|---|---|
| 标题: | picoCTF |
| 描述: | The it team are pretty sure that the headmaster got hacked again when\ \ they found a stranged device attached to his PC.\n> Here is a memory dump, identify\ \ the CVE used by the hacker, along with the username:password used for persistence.\> Flag format: shellmates{CVE-xxxx-yyyy:username:password} **Author**: Chih3b |
| 类型: | MISC |
| 网站: | bugku |
| 题目链接: | https://ctf.bugku.com/challenges/detail/id/499.html |
| 赛事: | HackINI2023 |
| 年度: | 2023 |
| Flag值: | picoCTF{p} |
| writeup: |
https://albert-notes.github.io/2023/03/30/picoctf-2023/ picoCTF{proxies_all_the_way_01e748db} https://albert-notes.github.io/2023/03/30/picoctf-2023/ picoCTF{53rv3r_53rv3r_53rv3r_53rv3r_53rv3r} https://www.cnblogs.com/sesmof/p/17992374 picoCTF{grep_is_good_to_find_things_5af9d829} https://jishuzhan.net/article/1903749889698377729 |