Lysithea
这家伙很懒什么也没留下
145
积分23632
排名38
金币- 排 名:
- 23632
- 积 分:
- 145
- 所属战队:
- 暂无
- 注册时间:
- 2023-02-26 00:22
解题记录
ID | 题目名称 | 类型 | 积分 | 金币 | 解题时间 |
---|---|---|---|---|---|
1 | JW token | WEB | 0 | 0 | 2024-04-26 15:23:07 |
2 | game-leaderboard | WEB | 0 | 0 | 2024-04-26 15:22:18 |
3 | Plain | MISC | 0 | 0 | 2023-12-07 21:24:01 |
4 | RSA | Crypto | 0 | 0 | 2023-12-07 16:57:45 |
5 | Eval Me | MISC | 0 | 0 | 2023-12-07 16:16:46 |
6 | jail | MISC | 0 | 0 | 2023-12-07 15:36:45 |
7 | Sneaky Png | MISC | 0 | 0 | 2023-12-07 15:10:05 |
8 | Packets don't lie | MISC | 0 | 0 | 2023-12-07 15:01:43 |
9 | Bars_and_Codes | MISC | 0 | 0 | 2023-12-07 14:14:32 |
10 | view source | WEB | 0 | 0 | 2023-12-07 13:29:33 |
11 | EasyReverse | Reverse | 0 | 0 | 2023-12-01 22:46:56 |
12 | Caesar cipher | Crypto | 0 | 0 | 2023-11-28 21:42:36 |
13 | USB | MISC | 0 | 0 | 2023-11-23 18:34:40 |
14 | cant-see-0x1 | MISC | 0 | 0 | 2023-11-23 18:21:03 |
15 | cant-see-0x0 | MISC | 0 | 0 | 2023-11-23 18:20:17 |
16 | Hello word | MISC | 0 | 0 | 2023-11-23 18:19:19 |
17 | hills | MISC | 0 | 0 | 2023-11-23 18:14:51 |
18 | lies | MISC | 0 | 0 | 2023-11-23 18:11:11 |
19 | wireshark | MISC | 0 | 0 | 2023-11-23 18:07:06 |
20 | Smurf | MISC | 0 | 0 | 2023-11-23 18:04:38 |
21 | babyPNG | MISC | 0 | 0 | 2023-11-23 17:50:04 |
22 | agentDNS | MISC | 0 | 0 | 2023-11-23 17:39:42 |
23 | ezCap | MISC | 0 | 0 | 2023-11-23 17:29:53 |
24 | python_jail | Crypto | 30 | 3 | 2023-11-08 17:08:41 |
25 | easy-pop | WEB | 0 | 0 | 2023-11-08 15:39:22 |
26 | 游戏过关 | Reverse | 15 | 2 | 2023-10-27 21:49:39 |
27 | 社工-进阶收集 | MISC | 10 | 3 | 2023-10-27 21:33:26 |
28 | linux | MISC | 15 | 1 | 2023-10-27 19:37:44 |
29 | ping | MISC | 15 | 3 | 2023-10-27 19:33:31 |
30 | [+-<>] | Crypto | 10 | 1 | 2023-10-27 02:21:10 |
31 | RCE won't help | WEB | 0 | 0 | 2023-10-27 02:09:45 |
32 | Ketchup | WEB | 0 | 0 | 2023-10-27 02:00:02 |
33 | Custom Protocol | WEB | 0 | 0 | 2023-10-27 00:49:02 |
34 | shero | WEB | 0 | 0 | 2023-10-27 00:01:41 |
35 | slasher | WEB | 0 | 0 | 2023-10-26 22:43:08 |
36 | MemeHub | WEB | 0 | 0 | 2023-10-26 20:42:10 |
37 | Robots | WEB | 0 | 0 | 2023-10-26 20:14:57 |
38 | baby_file | WEB | 0 | 0 | 2023-10-26 20:13:12 |
39 | 地狱通讯-改 | WEB | 0 | 0 | 2023-10-26 19:57:31 |
40 | 地狱通讯 | WEB | 0 | 0 | 2023-10-26 19:46:10 |
41 | Web安全入门指北—GET | WEB | 0 | 0 | 2023-10-26 19:22:33 |
42 | fake galgame | WEB | 0 | 0 | 2023-10-26 19:22:00 |
43 | babeRCE | WEB | 0 | 0 | 2023-10-26 18:58:09 |
44 | Do you know HTTP | WEB | 0 | 0 | 2023-10-26 18:33:52 |
45 | 2048 | WEB | 0 | 0 | 2023-10-26 18:32:17 |
46 | cookies | WEB | 0 | 0 | 2023-10-26 18:24:22 |
47 | ezphp | WEB | 0 | 0 | 2023-10-26 18:00:30 |
48 | ezhtml | WEB | 0 | 0 | 2023-10-26 17:27:58 |
49 | God_of_Aim | WEB | 0 | 0 | 2023-10-26 17:27:20 |
50 | passcode | Reverse | 0 | 0 | 2023-10-26 16:48:53 |
51 | crackini | Reverse | 0 | 0 | 2023-10-25 22:24:59 |
52 | baby lfi | WEB | 0 | 0 | 2023-10-13 01:36:39 |
53 | 重重flag背后隐藏的秘密 | MISC | 0 | 0 | 2023-10-13 01:16:46 |
54 | authme | PWN | 0 | 0 | 2023-10-10 01:55:55 |
55 | pyfmt-1 | MISC | 0 | 0 | 2023-10-10 00:50:00 |
56 | bird-box | MISC | 0 | 0 | 2023-10-10 00:37:26 |
57 | saferm | MISC | 0 | 0 | 2023-10-09 22:41:23 |
58 | No pressure | MISC | 0 | 0 | 2023-10-09 20:56:05 |
59 | readme | MISC | 0 | 0 | 2023-10-09 17:38:21 |
60 | weird-py | MISC | 0 | 0 | 2023-10-09 16:21:50 |
61 | B4nner_2 | MISC | 0 | 0 | 2023-10-09 16:13:16 |
62 | B4nner | MISC | 0 | 0 | 2023-10-09 02:42:23 |
63 | errorShell | MISC | 0 | 0 | 2023-10-09 01:34:27 |
64 | is__admin | MISC | 0 | 0 | 2023-10-09 01:27:44 |
65 | 一张含有信息的图片 | MISC | 0 | 0 | 2023-10-09 01:11:57 |
66 | 3-Unpleasant_music | MISC | 0 | 0 | 2023-10-09 00:45:46 |
67 | troll | PWN | 0 | 0 | 2023-10-07 00:16:35 |
68 | dataleak | PWN | 0 | 0 | 2023-10-07 00:01:55 |
69 | fastbin tutorial | PWN | 0 | 0 | 2023-10-06 23:51:38 |
70 | www | PWN | 0 | 0 | 2023-10-06 22:09:45 |
71 | flask真香 | WEB | 0 | 0 | 2023-10-06 18:13:34 |
72 | Science | WEB | 0 | 0 | 2023-10-06 17:04:19 |
73 | MofuMofu Diary | WEB | 0 | 0 | 2023-10-06 16:53:05 |
74 | charlottesweb | WEB | 0 | 0 | 2023-10-06 16:29:26 |
75 | nextGen 2 | WEB | 0 | 0 | 2023-10-06 00:01:13 |
76 | nextGen 1 | WEB | 0 | 0 | 2023-10-05 23:58:05 |
77 | Robots Rule | WEB | 0 | 0 | 2023-10-03 23:31:17 |
78 | post-the-get | WEB | 0 | 0 | 2023-10-03 23:12:50 |
79 | 好像说太多了 | MISC | 0 | 0 | 2023-10-03 23:01:56 |
80 | miniblog | WEB | 0 | 0 | 2023-10-03 21:26:46 |
81 | misc1 | MISC | 0 | 0 | 2023-10-02 23:01:05 |
82 | my-first-sqli | WEB | 0 | 0 | 2023-10-02 22:41:15 |
83 | inspect-me | WEB | 0 | 0 | 2023-10-02 22:33:12 |
84 | 勇闯迷宫-过三关 | PWN | 0 | 0 | 2023-10-02 22:23:21 |
85 | EasyXor | Reverse | 0 | 0 | 2023-10-02 00:58:54 |
86 | game1 | WEB | 15 | 3 | 2023-02-26 01:31:51 |
87 | 计算器 | WEB | 10 | 1 | 2023-02-26 01:09:33 |
88 | signin | Reverse | 15 | 3 | 2023-02-26 01:05:07 |
89 | Simple_SSTI_1 | WEB | 5 | 2 | 2023-02-26 00:31:00 |
90 | 签到题 | MISC | 5 | 10 | 2023-02-26 00:26:29 |
暂无数据
-
miniblog (KosenCTF)
进入环境后,是一个登录/注册页面,F12看不出什么信息,特别是标头没有服务端的信息。正常注册后登录,进入博客主要页面,可以上传博客,查看博客,更改模板,查看附件文件名,上传附件有一篇GREETING的博客介绍了网站的基本功能,也可以自己先玩一玩。上传里可以指定title和content,模板里可以看到对应的HTML模板,用`{{}}`的模板语法可以引用这些变量。可以上传tar/tar.gz格式的附...
- WEB
- 2023-10-03 21:50:07
-
勇闯迷宫-过三关 (陕西省大学生)
这题如题面所说分为三个部分,难度不高,第一部分考栈溢出,第二部分有点简单的逆向,第三部分考了一点fastbinattack,作为复习基础知识刚刚好拿到程序,首先做些基本检查:PartialRELRO,有Canary和NX,没有PIE。提供了libc(2.23)。got表里函数挺多,特别是看到了malloc和free,可能要用到堆。全局变量和main基本都保留了符号表,其他函数大多没有。第一部分直接...
- PWN
- 2023-10-03 22:53:45
-
slasher (Bsides-Algiers-2k21-Finals-chals)
打开之后首先是注册登录,然后可以进行文件上传。上传文件后,页面上出现文件名,并且可以通过?filename=参数下载回来,注意文件名被进行了base64编码。提示flag文件位于/flag处,因此构造文件名(ffffff7e56a0)使得base64编码后为////flag,这样再下载时,会直接根据绝对路径传回flag文件。网页上不太好直接操作,我这里用的pythonrequests库。上传完成后...
- WEB
- 2023-10-26 22:50:35
-
n00bz Packets don't lie (traffic analysis, osint)
题目给了一个pcap流量包+https_keys.log密钥文件,首先在wireshark里导入密钥,编辑-首选项-Protocols-TLS(可能有些版本Wireshark是SSL),在(Pre)-Master-Secretlogfilenames那里导入log,之后就可以看到http2的包了。大致看一眼,会发现有几个流量是查询wikipedia的,包括`/wiki/Switzerland`和一...
- MISC
- 2023-12-07 15:08:47
-
sekaiCTF2023 - evalme (这个题需要修一下环境)
题目分为两个部分,一个nc端口,一个流量包。流量包打开之后,可以看到有一些HTTP流量,是和`35.196.65.151`这个服务器通信,每次POST的都是一个JSON,`{"data":"xx"}`,其中xx是一个字节的hex,返回报文都是`{“ok”:true}`。POST出去的内容似乎不是任何一个已知的文件格式或加密方式。接下来看nc端口,看起来是一个简单的加减乘除速算,有时间限制,重复连几...
- MISC
- 2023-12-07 16:46:00
暂无数据