5-w1r3s.v1.0
12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061┌──(root㉿kali)-[~]└─# arp-scan -lInterface: eth0, type: EN10MB, MAC: 00:0c:29:26:ba:69, IPv4: 192.168.160.7Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)192.168.160.1 00:50:56:c0:00:08 VMware, Inc.192.168.160.2 00:50:56:e4:e9:e5 VMware, Inc.192.168.160.15 00:0c:29:aa:7f:fc VMware, Inc.192.168.160.254 00:50:56:e5:97:c0 VMware ...
2024龙信杯
案情简介:近期,某公安机关接到受害人报案:通过微信添加认识一位相亲中介客服,客服邀约其与“相亲”对象进行选妃,受害人上钩后,整个过程被涉案团伙录音录像,同时,该客服以有更多的对象可供挑选为由,引导受害人下载其事先制作好的木马APP,受害人安装该APP后,嫌疑人利用录制的视频和受害人的通讯录做要挟,从而实施多次诈骗。最终受害人不堪重负,选择报案。警方赶到现场后,发现涉案团伙参与另一起侵公案件,故迅速对现场设备进行证据固定制作镜像,并制作以下检材清单,请对检材分析:
序号
检材信息
检材大小
检材哈希(MD5)
1
受害人手机检材.dd
24,226,000,896 字节
f0fcbf82c134b5c47aac5355b74a83d8
2
涉案计算机检材.E01
12,510,412,800 字节
43d8b3820cd5103b42773b80140939aa
3
涉案服务器检材.E01
8,471,552,000 字节
6f970587231acbae7333b28168adc3b3
4
数据流量包.pcapng
17,334,272 字节
7847c2ee62 ...
废物的免杀日记
35eff57f879612928425d3f396b081584237c8b73b390b5ab09877e4ac7604d46890626f4874b7e9f942c4ce2c310a5572fdddbd848ab23a78324760b6b2ea90af026d79da1f126abefc57826d955c474b0a9e6f1fe5b8977791cc2b1a8543e296fa770d4533a674c27fc38cb7f7ad59eba81d95274e4e12d594978478d37af9cac6dfb1f6d5cec1116ce991691824d151b8d51f96fc0777562f450f24950ec6b45d8091785b17b1e5c2c80687b5dc8bb2a4824be4c239ff15ab2b28dd34fa9f75ef122f62560fa1c00db5a370af6eeb8b75cb6b5a17ce9d53a3de862c772d3765b311c893623da976ba72f97a3f506af994b352ea374086e ...
2024数证杯初赛
容器密码:
1/TP2G-h`q#(Ss!EUq,RR:Ss9"@!R"{-.kNw+-(gwGq.YLDS-|NEWH(GT3;6;
计算机取证对计算机镜像进行分析,计算该镜像中ESP分区的SM3值后8位为?(答案格式:大写字母与数字组合,如:D23DDF44) (2分)对计算机镜像进行分析,该操作系统超管账户最后一次注销时间为?(时区为UTC+08:00)(答案格式如:1970-01-01 00:00:00) (2分)12024-10-25 22:57:32
对计算机镜像进行分析,该操作系统超管账户有记录的登录次数为?(填写数字,答案格式如:1234) (2分)124
对计算机镜像进行分析,该操作系统设置的账户密码最长存留期为多少天?(填写数字,答案格式如:1234) (2分)142
对计算机镜像进行分析,该操作系统安装的数据擦除软件的版本为?(答案格式:1.23) (2分)15.86
对计算机镜像进行分析,该操作系统接入过一名称为“Realtek USB Disk autorun USB Device”的USB设备,其接入时分配的盘 ...
GHCTF2024
Po11uti0n~~~123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990import uuidfrom flask import Flask, request, sessionfrom secret import black_listimport json''' @Author: hey @message: Patience is the key in life,I think you'll be able to find vulnerabilities in code audits. * Th3_w0r1d_of_c0d3_1s_be@ut1ful_ but_y0u_c@n’t_c0mp1l3_love.'''app = ...
CTFSHOW单身杯
aef5431a8d9b4746aba55249c84fe5979c413816a1c93396351ce2d5c403a09d6f18383d8c6ac72cb23603ed24bebf24b152ec38a3b003060d67f5e422d91cc7c46548da5a242b2670532024dbfa391c10530af761d9b759cbda460c293557923d681fc7ef29f615d6914a4b02633c0eb4cd75ecb201de02d933c8a073a92186f39dcbc602c6dcf322bc93dc62bc677304730d0d7055fa7c77f7d39972b8e3e677b6663785a02f19f8f7d022446623f785ec7df0a96e4feda0a72296056df8922073745805df254e159bd5fd4c0a8a19e3961f4008d0771f44f2bffaa73af9371cd98379baed2c277d13d639eb729e4b051808e0692e6c940 ...
CTFSHOW1024杯
1024_WEB签到1234<?phperror_reporting(0);highlight_file(__FILE__);call_user_func($_GET['f']);
call_user_func ( callable $callback [, mixed $parameter [, mixed $… ]] ) : mixed
第一个参数 callback 是被调用的回调函数;其余参数是回调函数的参数;返回回调函数的返回值。
function:ctfshow_1024 support
1024_柏拉图1https://a639d06f-bd44-4d29-9573-06912170f33e.challenge.ctf.show/readfile.php?filename=123
url处双写绕过可以任意文件读取
index.php
1234567891011121314151617181920212223<?phperror_reporting(0);function curl($url){ $ch = c ...
XGCTF_西瓜杯
唯一感悟 webpwn要老命
CodeInject12345678<?php#Author: h1xaerror_reporting(0);show_source(__FILE__);eval("var_dump((Object)$_POST[1]);");
闭合前面 插入命令执行
11=1);system('ls');?>
1eval("var_dump(1=1);system('ls');?>");
tpdoor12345678910111213141516171819202122232425262728<?phpnamespace app\controller;use app\BaseController;use think\facade\Db;class Index extends BaseController{ protected $middleware = ['think\middleware\AllowCrossDomain ...
4-Tr0ll
123456789101112┌──(root㉿kali)-[~]└─# arp-scan -lInterface: eth0, type: EN10MB, MAC: 00:0c:29:26:ba:69, IPv4: 192.168.3.11Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)192.168.3.1 00:50:56:c0:00:08 VMware, Inc.192.168.3.2 00:50:56:e4:e9:e5 VMware, Inc.192.168.3.28 00:0c:29:39:e9:62 VMware, Inc.192.168.3.254 00:50:56:fd:ec:9f VMware, Inc.4 packets received by filter, 0 packets dropped by kernelEnding arp-scan 1.10.0: 256 hosts sc ...
pop链构造的一些其他考点
052d8417ade382eb3d9eced258afdba771af8040bf8208d2d03ddbadae90870061e6000744e0114d359f51981c2e6b8c484c9d6c4e004eccf33d8dd39e3bd38fcfc9c773ed4ec074999a99de92b6b7f16b4d55a15a7ac5a5baeb7b54e542e08346adb8bfe34399aa786b8b11ded34c379c0eb5c6773800c4dcd337b800a4ecf4fdba33ba96f1a4350d2de28119b2a5a9789027c12b84ad505dcc17abcfb7a108747a97a8ba85d12279cd3d1b3fff4eb101f0dfdcaeba062449274258ffe90c67aeb4ba18536048f90f03618bdedaafa534dcb413337edd689d65b61f0caf5b0ddcaefe67c1827f26e15c206ad4a6102ed58e350d5d17d36c9 ...