Compare commits

...

20 Commits

Author SHA1 Message Date
Li Wei
77ce841979 Update README.md 2023-12-07 11:39:50 +08:00
Li Wei
b6b3d4f2eb Update README.md 2023-12-07 11:39:31 +08:00
1809070261@qq.com
83124a6a9e Misc
Misc
2018-08-28 21:57:54 +08:00
1809070261@qq.com
5a2f7e3fa1 Misc
misc
2018-08-25 21:41:48 +08:00
sh1llc0de
9d29d4806c Update README.md 2018-08-23 04:43:02 +08:00
sh1llc0de
7adaa16ef2 update REAMDE 2018-08-23 04:41:25 +08:00
sh1llc0de
920db24ac4 upload web_7 2018-08-23 04:40:30 +08:00
sh1llc0de
331cb097fe update README 2018-08-23 04:36:11 +08:00
sh1llc0de
c48f69164f Merge branch 'master' of https://github.com/SecWiki/ctf-hub 2018-08-23 04:35:37 +08:00
sh1llc0de
73011836d7 upload web_6 2018-08-23 04:35:33 +08:00
WUHUIJUNG
b9bd4382a3 Update README.md 2018-08-21 23:37:46 +08:00
1809070261@qq.com
efe2dffebc Misc 2018-08-21 23:28:19 +08:00
1809070261@qq.com
72ca8609e0 Merge branch 'master' of https://github.com/SecWiki/ctf-hub 2018-08-21 18:42:41 +08:00
1809070261@qq.com
bd842ee92d MIsc 2018-08-21 18:41:36 +08:00
WUHUIJUNG
e033f663e5 Update README.md 2018-08-18 17:53:10 +08:00
1809070261@qq.com
498457d1da Merge branch 'master' of https://github.com/SecWiki/ctf-hub 2018-08-18 14:44:26 +08:00
1809070261@qq.com
ac8c995b33 misc
misc
2018-08-18 14:44:12 +08:00
WUHUIJUNG
9c12771fcf Update README.md 2018-08-17 18:59:36 +08:00
1809070261@qq.com
e1fe63bffd Merge branch 'master' of https://github.com/SecWiki/ctf-hub 2018-08-16 21:18:33 +08:00
1809070261@qq.com
a85086a5d0 Misc_4 2018-08-16 21:18:17 +08:00
42 changed files with 102 additions and 7 deletions

View File

@@ -10,10 +10,21 @@ This is the first time we have written a project, some of which are collected fr
- web_3
- web_4
- web_5
- web_6
- web_7
- **Misc**
- Misc_1
- Misc_2
- Misc_3
- Misc_4
- Misc_5
- Misc_6
- Misc_7
- Misc_8
- Misc_9
- Misc_10
- Misc_11
- Misc_12
- **Crypto**
- hex
- base
@@ -57,11 +68,6 @@ docker-compose up -d
```
- There is a corresponding documentation in each environment directory, please read this file for vulnerability/environment testing.
## Project maintenance ##
- WUJINLIN
[http://www.whj.website/](http://www.whj.website/)
- sh1llc0de
[https://www.sh1llc0de.xyz/](https://www.sh1llc0de.xyz/)
## Disclaimer ##
Do not use it for illegal purposes, otherwise the serious consequences will not be related to this project.。
@@ -71,5 +77,3 @@ Do not use it for illegal purposes, otherwise the serious consequences will not
## Reprint ##
Reprinted source[https://github.com/SecWiki/ctf-hub/](https://github.com/SecWiki/ctf-hub/)
©WUJINLIN,sh1llc0de 2018

1
misc/MIsc12/README.md Normal file
View File

@@ -0,0 +1 @@
#### 这也是网鼎杯的一道Misc

BIN
misc/MIsc12/Unpleasan.doc Normal file

Binary file not shown.

Binary file not shown.

1
misc/Misc10/README.md Normal file
View File

@@ -0,0 +1 @@
#### 这是一道网鼎杯的Misc题目。Is it base?

1
misc/Misc11/REAME.md Normal file
View File

@@ -0,0 +1 @@
#### 这是一道流量分析题目,同样的是王鼎杯的题目

BIN
misc/Misc11/track_hack.pdf Normal file

Binary file not shown.

2
misc/misc_4/README.md Normal file
View File

@@ -0,0 +1,2 @@
### 很简单的一道题目 ###
### 细心就可以了 ###

BIN
misc/misc_4/wp.docx Normal file

Binary file not shown.

1
misc/misc_4/下载.txt Normal file

File diff suppressed because one or more lines are too long

1
misc/misc_5/README.md Normal file
View File

@@ -0,0 +1 @@
### 入门级别的题目,看一眼就会的那种 ###

BIN
misc/misc_5/simple.pcapng Normal file

Binary file not shown.

BIN
misc/misc_5/wp.doc Normal file

Binary file not shown.

BIN
misc/misc_6/123.zip Normal file

Binary file not shown.

1
misc/misc_6/README.md Normal file
View File

@@ -0,0 +1 @@
### 这是我在打网鼎杯的时候自己做不出的题目。还是看了别人的WP做出来的

2
misc/misc_6/WP.txt Normal file
View File

@@ -0,0 +1,2 @@
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Լ<EFBFBD><EFBFBD>IJ<EFBFBD><EFBFBD>ͣ<EFBFBD>д<EFBFBD><EFBFBD>WP
https://www.whj.website/blog/2018/08/21/%E9%9A%90%E5%86%99Png(%E7%BD%91%E9%BC%8E%E6%9D%AF)/

BIN
misc/misc_7/Misc_7.zip Normal file

Binary file not shown.

1
misc/misc_7/README.MD Normal file
View File

@@ -0,0 +1 @@
### 是一个简单的加密哦

BIN
misc/misc_7/wp.doc Normal file

Binary file not shown.

1
misc/misc_8/README.md Normal file
View File

@@ -0,0 +1 @@
### 一张简单的图片

BIN
misc/misc_8/hub.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 379 KiB

BIN
misc/misc_8/wp.doc Normal file

Binary file not shown.

1
misc/misc_9/README.md Normal file
View File

@@ -0,0 +1 @@
### 用python来实现哦

BIN
misc/misc_9/aaa.rar Normal file

Binary file not shown.

BIN
misc/misc_9/wp.doc Normal file

Binary file not shown.

13
misc/misc_9/yiwei.py Normal file
View File

@@ -0,0 +1,13 @@
from string import maketrans
in_string = "abcdefghijklmnopqrstuvwxyz"
out_string = "cdefghijklmnopqrstuvwxyzab"
goal = """g fmnc wms bgblr rpylqjyrc gr zw fylb.
rfyrq ufyr amknsrcpq ypc dmp. bmgle gr gl zw fylb
gq glcddgagclr ylb rfyr'q ufw rfgq rcvr gq qm jmle.
sqgle qrpgle.kyicrpylq() gq pcamkkclbcb. lmu ynnjw ml rfc spj."""
trans_string = maketrans(in_string, out_string)
print goal.translate(trans_string)

3
web/web_6/Dockerfile Normal file
View File

@@ -0,0 +1,3 @@
FROM php:5.6-apache
COPY /code /var/www/html/

2
web/web_6/README.md Normal file
View File

@@ -0,0 +1,2 @@
## 恐龙的特性 ##
x计划平台上面的一道原题。

1
web/web_6/code/flag.php Normal file
View File

@@ -0,0 +1 @@
flag{eazy_ping}

18
web/web_6/code/index.php Normal file
View File

@@ -0,0 +1,18 @@
<?php
highlight_file(__FILE__);
ini_set("display_error", false);
error_reporting(0);
$str = isset($_GET['A_A'])?$_GET['A_A']:'A_A';
if (strpos($_SERVER['QUERY_STRING'], "A_A") !==false) {
echo 'A_A,have fun';
}
elseif ($str<9999999999) {
echo 'A_A,too small'."<br>";
}
elseif ((string)$str>0) {
echo 'A_A,too big'."<br>";
}
else{
echo file_get_contents('flag.php');
}
?>

View File

@@ -0,0 +1,4 @@
web:
build: .
ports:
- "80:80"

1
web/web_6/wirte-up.txt Normal file
View File

@@ -0,0 +1 @@
https://www.whj.website/blog/2018/08/22/%E4%B8%80%E9%81%93Web%E9%A2%98%E7%9B%AE/

4
web/web_7/Dockerfile Normal file
View File

@@ -0,0 +1,4 @@
FROM php:5.6-apache
COPY /code /var/www/html/
COPY /flag /

2
web/web_7/README.md Normal file
View File

@@ -0,0 +1,2 @@
## ctf极限利用 ##
在安全客上面看到的一道题目,感觉挺好的。

8
web/web_7/code/flag.php Normal file
View File

@@ -0,0 +1,8 @@
<?php
$FLAG = file_get_contents("/flag");
function getFlag(){
global $FLAG;
echo $FLAG;
}
?>

16
web/web_7/code/index.php Normal file
View File

@@ -0,0 +1,16 @@
<?php
include 'flag.php';
if(isset($_GET['code'])){
$code = $_GET['code'];
if(strlen($code)>40){
die("Long.");
}
if(preg_match("/[A-Za-z0-9]+/",$code)){
die("NO.");
}
@eval($code);
}else{
highlight_file(__FILE__);
}
//$hint = "php function getFlag() to get flag";
?>

View File

@@ -0,0 +1,4 @@
web:
build: .
ports:
- "80:80"

1
web/web_7/flag Normal file
View File

@@ -0,0 +1 @@
flag{xxxx}

1
web/web_7/write-up.txt Normal file
View File

@@ -0,0 +1 @@
https://www.sh1llc0de.xyz/2018/08/18/2018-8-18-ctf_%E6%9E%81%E9%99%90%E5%88%A9%E7%94%A8/