HackPack CTF 2021
Yaml-2-Json
没看到提示!
直接环境变量里有! tmp/flag.txt有问题!访问500
哦!
Sweet, so let’s go for RCE and read our flag from the server
I used the following payload at first but it fails since subprocess will only accept single commands like whoami, id
user_input: !!python/object/apply:subprocess.check_output ['cat /tmp/flag.txt'] |
My teammate Koimet helped me refine my payload to the following which gives us the flag
user_input: !!python/object/apply:subprocess.check_output |
Indead v2
是xxe + Docx
但是我的有点问题!不能直接读取! 我是外带报错带出来的!
UMDCTF 2021
The Matrix
感觉是robot ag伪造!
但是咋不行啊!
他有个303跳转! 🙄🙄🙄
我说咋一直不行呢!
Return of the Flag Bay
sql注入
但是有一点问题! 不知道后端咋写的!
admin 任意 |
The Matrix Revolutions
居然用dirb扫目录! 是国外的网站! 没想到
#!/usr/bin/env python |
Top of the Charts
日了!
I think the success has gone to its head.
-I
参数向服务器发出 HEAD 请求,然会将服务器返回的 HTTP 标头打印出来。
$ curl -I https://www.example.com
原来他说到Top
是这个意思! 🙄🙄🙄
nikto -h http://chals5.umdctf.io:4003 |
nikto 漏扫工具!国内用的少!
IOT Project
看项目记录! commits
记录的修改信息