• 2024-07-26XYCTF-MISC
     一.真>签到直接拖到010  XYCTF{59bd0e77d13c_1406b23219e_f91cf3a_153e8ea4_77508ba} 二.熊博士这一题直接拖进随波逐流一键解码CBXGU{ORF_BV_NVR_BLF_CRZL_QQ}xyctf{liu_ye_mei_you_xiao_jj}三.出题有点烦需要密码  爆破出来了  解码密码:123456
  • 2024-07-26XYCTF-RE
    一、聪明的信使说是re题,倒不如说是杂项题拖进IDA,一眼就到编码,点进去,复制编码,去随波逐流,一键解码原来是凯撒二、喵喵喵的flag碎了一地也是一道re题OpeninIDAandLearnaboutStringstofindthefirstpart这个是第一段flag的提示找到了第一段flag找到第二段flag
  • 2024-05-18XYCTF2024
    XYCTF2024warmup又是md5源码<?phpinclude'next.php';highlight_file(__FILE__);$XYCTF="Warmup";extract($_GET);if(isset($_GET['val1'])&&isset($_GET['val2'])&&$_GET['val1']!=$
  • 2024-05-13xyctf
    CryptobabyRSAMAXsouce.pyfromCrypto.Util.numberimport*fromgmpy2import*fromrandomimportchoiceflag=b'XYCTF{******}'e='?'defgetBabyPrime(nbits):whileTrue:p=1whilep.bit_length()<=nbits:
  • 2024-05-03[XYCTF] fastfastfast
    [XYCTF]fastfastfastUAF|fast_bin_attack|tcache|leak_libc[*]'/home/bamuwe/fastfastfast/vuln'Arch:amd64-64-littleRELRO:PartialRELROStack:CanaryfoundNX:NXenabledPIE:NoPIE(0x3fd000)$chec
  • 2024-04-29XYCTF pwn部分题解 (部分题目详解)
    hello_world(签到)思路:✅这道题就是利用printf函数泄露libc的基地址,然后再次进行栈溢出通过system,/bin/sh来获取shellwp:invisible_flag思路:✅题目提示orw,那我们先看看是否开了沙盒那么是开了沙盒的,试试orw读取flag虽然保护全开但是程序会执行我们写的shellcdoe那么就可