[2021祥云杯]PackageManager2021
# [2021 祥云杯] PackageManager2021
index.ts 的源码:
import * as express from "express";import { User } from "../schema";import { checkmd5Regex } from "../utils";const router = express.Router();router.get('/', (_, res) =>...
more...
[CISCN2021Quals]upload
/ 源码:
<?php#Quals]upload if (!isset($_GET["ctf"])) { highlight_file(__FILE__); die();}if(isset($_GET["ctf"])) $ctf = $_GET["ctf"];if($ctf=="upload") { if ($_FILES['postedFile']['size'] > 1024*512) {...
more...
SHctf-2024部分复现
# SHctf2024 部分复现:
# week2:登陆验证
描述:
他们都说jwt不安全,那我拿个密钥加密不就行了,你又不知道密钥是多少。什么? 你说可以爆破出来? 666666!
登陆页面登录后:
发现可疑 token:SHctf 复现...
more...
[NewStarCTF2023公开赛道]include0。0
<?phphighlight_file(__FILE__);// FLAG in the flag.php$file = $_GET['file'];if(isset($file) && !preg_match('/base|rot/i',$file)){ @include($file);}else{ die("nope");}?>convert.iconv.*...
more...
[羊城杯2020]EasySer
# 羊城杯 2020-EasySer
一进去就是这个,直接信息搜集,robots.txt,www.zip,www.zip.gz
robots.txt:
star1.php
进入发现是
CTRL U 发现有提示说
用个不安全的协议从我家才能进ser.php
用 http://127.0.0.1/ser.php 发现有源码(可以先 star1.php 的):
ser.php:
<?phperror_reporting(0);if ( $_SERVER['REMOTE_ADDR'] == "127.0.0.1" ) {...
more...
[网鼎杯2020青龙组]notes
# [网鼎杯 2020 青龙组] notes
压缩包解压后 index.js:
var express = require('express');var path = require('path');const undefsafe = require('undefsafe');const { exec } = require('child_process');var app = express();class Notes { constructor() {...
more...
[HITCON2016]Leaking
# [HITCON2016]Leaking
源码:
"use strict";var randomstring = require("randomstring");var express = require("express");var { VM} = require("vm2");var fs = require("fs");var app = express();var flag =...
more...
[BSidesCF2019]Pick Tac Toe
# [BSidesCF 2019]Pick Tac Toe
基本上就是 ctrl+u(看见 /move 的路由,有一些 id,有 POST 方法,试一下 /move,POST:move=id)发现只能改一次,但是也够了用 move=r,i 第二行最后一个就行
more...