Skip to content

Latest commit

 

History

History
172 lines (86 loc) · 3.4 KB

虎符 2022.md

File metadata and controls

172 lines (86 loc) · 3.4 KB

比赛地址:https://datacon.qianxin.com/ctf/22/stage

题目网盘备份

链接:https://pan.baidu.com/s/1vcJZarQwLqsw0uYRRNuPYg 提取码:xmxm

pwn

Pwn | hfdev

赛题描述

ubuntu 20.04, qemu6.1.1

Pwn | vdq

赛题描述

Just a rust program

Pwn | mva

赛题描述

Just a simple program

Pwn | gogogo

赛题描述 无

Pwn | babygame

赛题描述 无

Crypto

Crypto | ERRORS

赛题描述 nc 120.77.30.1 40999 120.77.65.207 40999 47.107.31.31 40999

Crypto | Corrupted

赛题描述

Here is a corrupted PEM file, please help me to recover it! FLAG is HFCTF{sha256 of recovered PEM file}

Crypto | HCDSA

赛题描述

What's the shared key?

提示:Search Engine is your best teacher. This is a homemade scheme, so you may not get any useful information after searching with keywords such as "HCDSA" directly. Why not picking other schemes which are used widely in real world as keywords, and you may find what you want.

提示:For the order of curve, you need to read some papers to compute it. For the faults in the signing process, there was a similar bug in a famous cryptocurrency project.

提示:Convert XOR to ADD

Crypto | HCDH

赛题描述

What's Bob's secret key?

Crypto | RRSSAA

赛题描述 无

web

Web | ezphp

赛题描述 无

Web | Baby Router Updater

赛题描述 无

提示:1. 不提供/usr/sbin/do-upgrade文件,固件格式可以从test_patch.fw分析 2. 时间侧信道

Web | ezchain

赛题描述

地址: 47.107.31.31:48090 120.77.30.1:48090 120.77.65.207:48090 环境每30分钟重置一次

Web | babysql

赛题描述

It is a pure sql injection challenge. Login any account to get flag. Have fun with mysql 8. There is something useful in /hint.md.

提示:regexp

misc

Misc | Check in

赛题描述

关注"DataCon大数据安全分析竞赛"回复"2022虎符签到"即可获得flag

Misc | static

赛题描述

Just a simple contract nc 47.107.31.31 42000 faucet 47.107.31.31 48080 geth 47.107.31.31 48545 备用IP(端口不变): 120.77.30.1 120.77.65.207

Misc | handle

赛题描述

play a game! nc 120.77.30.1 48771 nc 120.77.65.207 48771 nc 47.107.31.31 48771

Misc | Plain Text

赛题描述

ZE9CUk8gUE9WQUxPV0FUWCBOQSBNQVReLCBXWSBET0xWTlkgUEVSRVdFU1RJIFxUTyBOQSBBTkdMSUpTS0lKIFFaWUsuIHRXT0ogU0VLUkVUIFNPU1RPSVQgSVogRFdVSCBTTE9XLiB3U0UgQlVLV1kgU1RST15OWUUuIHFCTE9eTllKIEFSQlVaLiB2RUxBRU0gV0FNIE9UTEleTk9HTyBETlEu Flag格式 HFCTF{[a-z_]+},如有空格使用下划线代替。

Misc | Meta

赛题描述

http://54.64.248.8:13512

Misc | Quest-Crash

赛题描述 无

Misc | Quest-RCE

赛题描述 无

Reverse

Reverse | Contra 2048

赛题描述

Someone used a cheat code in Contra 2048 and we captured his traffic. Please help me find his cheat code.

Reverse | fpbe

赛题描述

Just a simple sudo program

Reverse | Ambitious Catches

赛题描述

I wonna translate my flag, but my brother did some weird thing..

提示:1. Do you believe in gxx's personality? You may wonder where I set the registers.

提示:Hurry up, my code can only check the flag for you in a very limit time. The ciphertext is generated at the same time as the code file.

Reverse | Loop

赛题描述

I hate loops... But I must admit that they can be very useful sometimes. So could you get them back for me?

Reverse | the_shellcode

赛题描述

Are you familiar with techniques that malwares usually use?