picoCTF-2023-部分wp
web
findme
访问页面,是一个登录的页面,账号密码test/test!
抓包看到跳转到一个页面,
(/images/2023picoctf/image-20230327162639364.png)
访问这个/next-page/id=cGljb0NURntwcm94aWVzX2Fs
抓包,中间又会跳转一个页面,直接跳出来一个页面,看到有一个id,好像是base64,直接拼接
flag:picoCTF{proxies_all_the_way_a0fe074f}
chrono
How to automate tasks to run at intervals on linux servers?
机翻:如何自动执行任务以在 Linux 服务器上定期运行?
给了账号密码端口,直接连上去
定时任务的命令 crontab ,执行crontab -l 发现没有,crontab的文件目录在/etc/下 以cron开头,
在 challenge目录下也有flag
flag:{“flag”: “picoCTF{Sch3DUL7NG_T45K3_L1NUX_1d781160}”, “username”: “picoplayer”, “password”: “dd4yT2bR
hideme
Every file gets a flag.
The SOC analyst saw one image been sent back and forth between two people. They decided to investigate and found out that there was more than what
机翻一下:每个文件都有一个标志。
SOC 分析师看到一张图像在两个人之间来回发送。 他们决定展开调查,发现事情远不止于此
直接下载一张图片
foremost 有一个zip包
ristretto flag.png
flag:pIcoCTF{Hiddinng_An_imag3_within_@n_ima9e_96539bea}
MatchTheRegex
正则匹配
输入框输入东西,
p开头 F结尾
^n | 匹配任何开头为 n 的字符串。 |
---|---|
flag:picoCTF{succ3ssfully_matchtheregex_0694f25b}
SOAP
money-ware
Flag format: picoCTF{Malwarename}The first letter of the malware name should be capitalized and the rest lowercase.Your friend just got hacked and has been asked to pay some bitcoins to 1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX
. He doesn’t seem to understand what is going on and asks you for advice. Can you identify what malware he’s being a victim of?
标记格式:picoCTF{Malwarename}
恶意软件名称的首字母应大写,其余字母小写。
您的朋友刚刚被黑客入侵,并被要求向 1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX 支付一些比特币。 他似乎不明白发生了什么,并向你征求意见。 你能确定他是哪种恶意软件的受害者吗?
flag:picoCTF{Petya}
repetitions
下载文件,拖到ida
base64 多解几次
flag:picoCTF{base64_n3st3d_dic0d!n8_d0wnl04d3d_9b59b35c}
rule
flag:picoCTF{h34rd_und3r5700d_4ck_cba1c711}
FindAndOpen
下载pacp包,中间有个base解一下
这个是下面压缩包的密码
再解一下,就可以了
picoCTF{R34DING_LOKd_fil56_succ3ss_419835ef}
Reverse
reverse
直接拖到ida里
safe opener2
直接拖到ida
timer
拖到Androidkill里
找到buildconfig文件即可
flag:picoCTF{t1m3r_r3v3rs3d_succ355fully_17496}