Lysithea
这家伙很懒什么也没留下
145
积分31040
排名38
金币- 排 名:
- 31040
- 积 分:
- 145
- 所属战队:
- 暂无
- 注册时间:
- 2023-02-26 00:22
解题记录
| ID | 题目名称 | 类型 | 积分 | 金币 | 解题时间 |
|---|---|---|---|---|---|
| 1 | JW token | WEB | 0 | 0 | 2024-04-26 15:23:07 |
| 2 | game-leaderboard | WEB | 0 | 0 | 2024-04-26 15:22:18 |
| 3 | Plain | MISC | 0 | 0 | 2023-12-07 21:24:01 |
| 4 | RSA | Crypto | 0 | 0 | 2023-12-07 16:57:45 |
| 5 | Eval Me | MISC | 0 | 0 | 2023-12-07 16:16:46 |
| 6 | jail | MISC | 0 | 0 | 2023-12-07 15:36:45 |
| 7 | Sneaky Png | MISC | 0 | 0 | 2023-12-07 15:10:05 |
| 8 | Packets don't lie | MISC | 0 | 0 | 2023-12-07 15:01:43 |
| 9 | Bars_and_Codes | MISC | 0 | 0 | 2023-12-07 14:14:32 |
| 10 | view source | WEB | 0 | 0 | 2023-12-07 13:29:33 |
| 11 | EasyReverse | Reverse | 0 | 0 | 2023-12-01 22:46:56 |
| 12 | Caesar cipher | Crypto | 0 | 0 | 2023-11-28 21:42:36 |
| 13 | USB | MISC | 0 | 0 | 2023-11-23 18:34:40 |
| 14 | cant-see-0x1 | MISC | 0 | 0 | 2023-11-23 18:21:03 |
| 15 | cant-see-0x0 | MISC | 0 | 0 | 2023-11-23 18:20:17 |
| 16 | Hello word | MISC | 0 | 0 | 2023-11-23 18:19:19 |
| 17 | hills | MISC | 0 | 0 | 2023-11-23 18:14:51 |
| 18 | lies | MISC | 0 | 0 | 2023-11-23 18:11:11 |
| 19 | wireshark | MISC | 0 | 0 | 2023-11-23 18:07:06 |
| 20 | Smurf | MISC | 0 | 0 | 2023-11-23 18:04:38 |
| 21 | babyPNG | MISC | 0 | 0 | 2023-11-23 17:50:04 |
| 22 | agentDNS | MISC | 0 | 0 | 2023-11-23 17:39:42 |
| 23 | ezCap | MISC | 0 | 0 | 2023-11-23 17:29:53 |
| 24 | python_jail | Crypto | 30 | 3 | 2023-11-08 17:08:41 |
| 25 | easy-pop | WEB | 0 | 0 | 2023-11-08 15:39:22 |
| 26 | 游戏过关 | Reverse | 15 | 2 | 2023-10-27 21:49:39 |
| 27 | 社工-进阶收集 | MISC | 10 | 3 | 2023-10-27 21:33:26 |
| 28 | linux | MISC | 15 | 1 | 2023-10-27 19:37:44 |
| 29 | ping | MISC | 15 | 3 | 2023-10-27 19:33:31 |
| 30 | [+-<>] | Crypto | 10 | 1 | 2023-10-27 02:21:10 |
| 31 | RCE won't help | WEB | 0 | 0 | 2023-10-27 02:09:45 |
| 32 | Ketchup | WEB | 0 | 0 | 2023-10-27 02:00:02 |
| 33 | Custom Protocol | WEB | 0 | 0 | 2023-10-27 00:49:02 |
| 34 | shero | WEB | 0 | 0 | 2023-10-27 00:01:41 |
| 35 | slasher | WEB | 0 | 0 | 2023-10-26 22:43:08 |
| 36 | MemeHub | WEB | 0 | 0 | 2023-10-26 20:42:10 |
| 37 | Robots | WEB | 0 | 0 | 2023-10-26 20:14:57 |
| 38 | baby_file | WEB | 0 | 0 | 2023-10-26 20:13:12 |
| 39 | 地狱通讯-改 | WEB | 0 | 0 | 2023-10-26 19:57:31 |
| 40 | 地狱通讯 | WEB | 0 | 0 | 2023-10-26 19:46:10 |
| 41 | Web安全入门指北—GET | WEB | 0 | 0 | 2023-10-26 19:22:33 |
| 42 | fake galgame | WEB | 0 | 0 | 2023-10-26 19:22:00 |
| 43 | babeRCE | WEB | 0 | 0 | 2023-10-26 18:58:09 |
| 44 | Do you know HTTP | WEB | 0 | 0 | 2023-10-26 18:33:52 |
| 45 | 2048 | WEB | 0 | 0 | 2023-10-26 18:32:17 |
| 46 | cookies | WEB | 0 | 0 | 2023-10-26 18:24:22 |
| 47 | ezphp | WEB | 0 | 0 | 2023-10-26 18:00:30 |
| 48 | ezhtml | WEB | 0 | 0 | 2023-10-26 17:27:58 |
| 49 | God_of_Aim | WEB | 0 | 0 | 2023-10-26 17:27:20 |
| 50 | passcode | Reverse | 0 | 0 | 2023-10-26 16:48:53 |
| 51 | crackini | Reverse | 0 | 0 | 2023-10-25 22:24:59 |
| 52 | baby lfi | WEB | 0 | 0 | 2023-10-13 01:36:39 |
| 53 | 重重flag背后隐藏的秘密 | MISC | 0 | 0 | 2023-10-13 01:16:46 |
| 54 | authme | PWN | 0 | 0 | 2023-10-10 01:55:55 |
| 55 | pyfmt-1 | MISC | 0 | 0 | 2023-10-10 00:50:00 |
| 56 | bird-box | MISC | 0 | 0 | 2023-10-10 00:37:26 |
| 57 | saferm | MISC | 0 | 0 | 2023-10-09 22:41:23 |
| 58 | No pressure | MISC | 0 | 0 | 2023-10-09 20:56:05 |
| 59 | readme | MISC | 0 | 0 | 2023-10-09 17:38:21 |
| 60 | weird-py | MISC | 0 | 0 | 2023-10-09 16:21:50 |
| 61 | B4nner_2 | MISC | 0 | 0 | 2023-10-09 16:13:16 |
| 62 | B4nner | MISC | 0 | 0 | 2023-10-09 02:42:23 |
| 63 | errorShell | MISC | 0 | 0 | 2023-10-09 01:34:27 |
| 64 | is__admin | MISC | 0 | 0 | 2023-10-09 01:27:44 |
| 65 | 一张含有信息的图片 | MISC | 0 | 0 | 2023-10-09 01:11:57 |
| 66 | 3-Unpleasant_music | MISC | 0 | 0 | 2023-10-09 00:45:46 |
| 67 | troll | PWN | 0 | 0 | 2023-10-07 00:16:35 |
| 68 | dataleak | PWN | 0 | 0 | 2023-10-07 00:01:55 |
| 69 | fastbin tutorial | PWN | 0 | 0 | 2023-10-06 23:51:38 |
| 70 | www | PWN | 0 | 0 | 2023-10-06 22:09:45 |
| 71 | flask真香 | WEB | 0 | 0 | 2023-10-06 18:13:34 |
| 72 | Science | WEB | 0 | 0 | 2023-10-06 17:04:19 |
| 73 | MofuMofu Diary | WEB | 0 | 0 | 2023-10-06 16:53:05 |
| 74 | charlottesweb | WEB | 0 | 0 | 2023-10-06 16:29:26 |
| 75 | nextGen 2 | WEB | 0 | 0 | 2023-10-06 00:01:13 |
| 76 | nextGen 1 | WEB | 0 | 0 | 2023-10-05 23:58:05 |
| 77 | Robots Rule | WEB | 0 | 0 | 2023-10-03 23:31:17 |
| 78 | post-the-get | WEB | 0 | 0 | 2023-10-03 23:12:50 |
| 79 | 好像说太多了 | MISC | 0 | 0 | 2023-10-03 23:01:56 |
| 80 | miniblog | WEB | 0 | 0 | 2023-10-03 21:26:46 |
| 81 | misc1 | MISC | 0 | 0 | 2023-10-02 23:01:05 |
| 82 | my-first-sqli | WEB | 0 | 0 | 2023-10-02 22:41:15 |
| 83 | inspect-me | WEB | 0 | 0 | 2023-10-02 22:33:12 |
| 84 | 勇闯迷宫-过三关 | PWN | 0 | 0 | 2023-10-02 22:23:21 |
| 85 | EasyXor | Reverse | 0 | 0 | 2023-10-02 00:58:54 |
| 86 | game1 | WEB | 15 | 3 | 2023-02-26 01:31:51 |
| 87 | 计算器 | WEB | 10 | 1 | 2023-02-26 01:09:33 |
| 88 | signin | Reverse | 15 | 3 | 2023-02-26 01:05:07 |
| 89 | Simple_SSTI_1 | WEB | 5 | 2 | 2023-02-26 00:31:00 |
| 90 | 签到题 | MISC | 5 | 10 | 2023-02-26 00:26:29 |
暂无数据
-
miniblog (KosenCTF)
进入环境后,是一个登录/注册页面,F12看不出什么信息,特别是标头没有服务端的信息。正常注册后登录,进入博客主要页面,可以上传博客,查看博客,更改模板,查看附件文件名,上传附件有一篇GREETING的博客介绍了网站的基本功能,也可以自己先玩一玩。上传里可以指定title和content,模板里可以看到对应的HTML模板,用`{{}}`的模板语法可以引用这些变量。可以上传tar/tar.gz格式的附...
- WEB
- 2023-10-03 21:50:07
-
勇闯迷宫-过三关 (陕西省大学生)
这题如题面所说分为三个部分,难度不高,第一部分考栈溢出,第二部分有点简单的逆向,第三部分考了一点fastbinattack,作为复习基础知识刚刚好拿到程序,首先做些基本检查:PartialRELRO,有Canary和NX,没有PIE。提供了libc(2.23)。got表里函数挺多,特别是看到了malloc和free,可能要用到堆。全局变量和main基本都保留了符号表,其他函数大多没有。第一部分直接...
- PWN
- 2023-10-03 22:53:45
-
slasher (Bsides-Algiers-2k21-Finals-chals)
打开之后首先是注册登录,然后可以进行文件上传。上传文件后,页面上出现文件名,并且可以通过?filename=参数下载回来,注意文件名被进行了base64编码。提示flag文件位于/flag处,因此构造文件名(ffffff7e56a0)使得base64编码后为////flag,这样再下载时,会直接根据绝对路径传回flag文件。网页上不太好直接操作,我这里用的pythonrequests库。上传完成后...
- WEB
- 2023-10-26 22:50:35
-
n00bz Packets don't lie (traffic analysis, osint)
题目给了一个pcap流量包+https_keys.log密钥文件,首先在wireshark里导入密钥,编辑-首选项-Protocols-TLS(可能有些版本Wireshark是SSL),在(Pre)-Master-Secretlogfilenames那里导入log,之后就可以看到http2的包了。大致看一眼,会发现有几个流量是查询wikipedia的,包括`/wiki/Switzerland`和一...
- MISC
- 2023-12-07 15:08:47
-
sekaiCTF2023 - evalme (这个题需要修一下环境)
题目分为两个部分,一个nc端口,一个流量包。流量包打开之后,可以看到有一些HTTP流量,是和`35.196.65.151`这个服务器通信,每次POST的都是一个JSON,`{"data":"xx"}`,其中xx是一个字节的hex,返回报文都是`{“ok”:true}`。POST出去的内容似乎不是任何一个已知的文件格式或加密方式。接下来看nc端口,看起来是一个简单的加减乘除速算,有时间限制,重复连几...
- MISC
- 2023-12-07 16:46:00
暂无数据