WEMEWEMJWEMJW [FlareOn1]Bob Doge# 这一上我还以为要逆安装程序,结果是安装完的程序。。。 c#,dnspy打开,找到decode,在下图处下个断 得到flag [FlareOn2]very_success# 32exe,应该是用汇编写的 这里很有意思,这个pop把返回地址压入eax 进sub_401084, 压入的地址被作为数据进行比对,其中加法用的是adc,v1...
1.下载附件,对其进行解压,发现一张a_very_good_idea.jpg图片,首先对其进行图片查看,是否含有隐藏文件 2.通过binwalk命令对图片文件进行分析,发现包含有压缩文件,且压缩文件内含有2张图片和一个txt文件 binwalk a_very_good_idea.jpg 3.通过foremost命令对a_very_good_idea.jpg 图片文件进行分解 foremost a_very_g...
For years, the Capture the Flag platform has been a common and very popular part of the hacker convention scene. Teams come from all over the world to show their skill and technique in various competitions. The CTF365 team took that interest, passion and excitement and went to a new level...
0SUCCESSThe executable execution succeeded 2N/AThe executable does have a meaning in the context of this challenge 3MANUALThe executable cannot perform this task entirely, you will have to get your hands dirty 4NOT IMPLEMENTEDThe executable is not implemented yet ...
Flag: darkCTF{it_is_very_easy_to_find}Dusty NotesDescriptionSometimes some inputs can lead to flag PS :- All error messages are intended SolutionWe get a link that gives us the next page: Long story short, we can add and delete notes. Playing with some requests in Burp I noticed that...
STAKcDAKMFMnY2F0IC9UaDRzX0lTX1ZFUllfSW1wb3J0X0ZpMWUnCnAxCjAoZzAKbHAyCjAoSTAKdHAzCjAoZzMKSTAKZHA0CjBjb3MKc3lzdGVtCnA1CjBnNQooZzEKdFIudecode of base640S'cat /Th4s_IS_VERY_Import_Fi1e' 即可看到文件的绝对路径 简单日志分析3 简单日志分析-3: 黑客反弹shell的ip和端口是___。(格式使用“ip:...
inspired in part by the success of theHack-A-Satqualifying rounds, which were also held remotely. It sounds like the GNU Radio CTF challenge will be pretty amazing, with IQ files being distributed to participants in lieu of actually setting up receivers. We wish Michelle and the other challen...
BabyMi 首先tshark提取一下usbdata的数据 tshark -r a.pcap -T fields -e usb.capdata | tr -s ‘\n’ > data_list python脚本按行读取去除每行最后的换行。 result+=line[:-1] 利用010editor导入16进制保存即可。 之后diskgenius一下可以直接得到视频,拿到flag。
Send us proof of your success (you will receive instructions upon solving the puzzle) before 17:00 CEST, May 26th, 2023. Over 90 brave reversers are already trying to solve it, but do not worry… speed is not essential! We will randomly pick ten winners and award them. Here is what...
)"exit 1-name:Set up Python3if:${{ success() }}uses:actions/setup-python@v1with:python-version:"3.7"-name:Checkout this repoif:${{ success() }}uses:actions/checkout@v2with:persist-credentials:false-name:Run the python3 script for this actionif:${{ success() }}env:REPORT_TOKEN:$...