- 2024-07-26XYCTF-MISC
一.真>签到直接拖到010 XYCTF{59bd0e77d13c_1406b23219e_f91cf3a_153e8ea4_77508ba} 二.熊博士这一题直接拖进随波逐流一键解码CBXGU{ORF_BV_NVR_BLF_CRZL_QQ}xyctf{liu_ye_mei_you_xiao_jj}三.出题有点烦需要密码 爆破出来了 解码密码:123456
- 2024-07-26XYCTF-RE
一、聪明的信使说是re题,倒不如说是杂项题拖进IDA,一眼就到编码,点进去,复制编码,去随波逐流,一键解码原来是凯撒二、喵喵喵的flag碎了一地也是一道re题OpeninIDAandLearnaboutStringstofindthefirstpart这个是第一段flag的提示找到了第一段flag找到第二段flag
- 2024-05-18XYCTF2024
XYCTF2024warmup又是md5源码<?phpinclude'next.php';highlight_file(__FILE__);$XYCTF="Warmup";extract($_GET);if(isset($_GET['val1'])&&isset($_GET['val2'])&&$_GET['val1']!=$
- 2024-05-13xyctf
CryptobabyRSAMAXsouce.pyfromCrypto.Util.numberimport*fromgmpy2import*fromrandomimportchoiceflag=b'XYCTF{******}'e='?'defgetBabyPrime(nbits):whileTrue:p=1whilep.bit_length()<=nbits:
- 2024-05-03[XYCTF] fastfastfast
[XYCTF]fastfastfastUAF|fast_bin_attack|tcache|leak_libc[*]'/home/bamuwe/fastfastfast/vuln'Arch:amd64-64-littleRELRO:PartialRELROStack:CanaryfoundNX:NXenabledPIE:NoPIE(0x3fd000)$chec
- 2024-04-29XYCTF pwn部分题解 (部分题目详解)
hello_world(签到)思路:✅这道题就是利用printf函数泄露libc的基地址,然后再次进行栈溢出通过system,/bin/sh来获取shellwp:invisible_flag思路:✅题目提示orw,那我们先看看是否开了沙盒那么是开了沙盒的,试试orw读取flag虽然保护全开但是程序会执行我们写的shellcdoe那么就可