shctf2023专题

SHCTF2023-校外赛道WP部分

SHCTF2023-校外赛道WP部分 前言:Web:[WEEK1]babyRCE:[WEEK1]1zzphp:[WEEK1]ez_serialize:[WEEK1]登录就给flag:[WEEK1]飞机大战:[WEEK1]ezphp: MISC:[WEEK1]请对我使用社工吧:[WEEK1]也许需要一些py:[WEEK1]ez-misc:[WEEK1]Steganography:[WEEK1]

SHCTF2023 山河CTF Reverse方向[Week1]全WP 详解

文章目录 [WEEK1]ez_asm[WEEK1]easy_re[WEEK1]seed[WEEK1]signin[WEEK1]easy_math[WEEK1]ez_apk [WEEK1]ez_asm 从上往下读,第一处是xor 1Eh,第二处是sub 0Ah;逆向一下先加0A后异或1E 写个EXP data = "nhuo[M`7mc7uhc$7midgbTf`7`$7%#u

SHCTF2023 山河CTF Reverse方向week2weenk3部分WP【详解】

文章目录 [WEEK3]ststst[WEEK2]not gcc[WEEK2]Run?润![WEEK2]Authur's_box[WEEK2]pycode [WEEK3]ststst 64 bit 的 ELF 文件 sub_400763点进去看看 mprotect ,这个 这一题是SMC + TEA的考察,我写过一篇关于 SMC学习网鼎杯jocker 可以使用i