Big challenges of SYC: writeup

Source: Internet
Author: User
Welcome

Copy and paste the flag.

 

I believe that you are on the road to meeting me

Follow the work number and reply "I want to flag" to get the flag

 

The first act of the action codenamed geek: the first appearance of drug fog

Found that flag is the moers' password SYC {--... -. -. --. -. -.. ----...... -... -.... --... --.}

Translation website Baidu

Translation result: geekactionhasbegun

Corresponding flag: SYC {geekactionhasbegun}

 

2000-word review

On the submit page, open the universal checklist and prepare to copy and paste it for submission.

  

The content cannot be copied. The F12 review elements are copied.

Paste it to the submit box. The flag is obtained successfully!

 

Lucky challenges

Click Submit to view the results. According to the question, only get10.00 can be used to obtain the MacBook Pro (FLAG)

Use burp to modify the value and then input

Successfully received the consolation prize flag an hhh

The third act of action codenamed geek: Dark network pursuit

If the image is not displayed as an administrator, some judgment may exist. Check the packet capture information of the burp.

The is_admin attribute value in the cookie is 0. Change it to 1.

Cool get flag!

 

Coming soon

Find the source code based on the question, open the page source code, CTRL + F to search for the flag

Act 2, codenamed geek: deprecated underground hacker forum

Come to a backend and try to get the returned results.

An SQL statement is returned, which is the logic judgment of background logon. It is known that this question should be a logical bypass.

The statement is analyzed to construct a statement with the final result

If you want to escape the statement in '', you must add 'single quotation marks before payload to close the quotation marks, and add or to the middle to judge the statement as a true statement, then add the # Or -- comment out the additional content at the end.

The constructed payload is as follows:

Username: 'or 1 = 1 # Or' or 1 = 1 --

Use the above statement and enter the password as needed.

Bypass successfully, get flag ~

Come and join the PHP ghost cat. (WP provided by the ghost wave QQ: 750358905 everyone will harass him)

First, analyze the PHP code in the source code

The audit shows the entire process of obtaining flag.

First, determine the existence of the P1 variable, the value is greater than 99999999, and so on. If it is true, continue to determine whether P2 exists and is not a number

The preceding parameters are all completed using the GET request. The payload constructed is as follows:

Input, and then get flag

Act 4, codenamed geek: Top Secret Intelligence (This question WP is provided by Yan Lang)

First, analyze the PHP source code:

<? PHP
Error_reporting (0); // close the error report
If (! Empty ($ _ Get) |! Empty ($ _ post) {If (preg_match ("syclover", $ _ Get ['id']) {
Echo ("<p> you're a gay, not allowed! </P> ");
Exit ();
}

$ _ Get ['id'] = urldecode ($ _ Get ['id']); // perform URL Decoding on the obtained value

If ($ _ Get ['id'] = "syclover") // you can run the following command to determine whether the value is "syclover" or not.
{
Echo "<p> Wow ~ , You're smart, access granted! </";

$ F = $ _ post [file]; // The parameter for receiving the variable for receiving post data is file.
$ STR = $ F. ". php"; // character concatenation. This is a suffix.
@ Require $ STR; // File Inclusion
}
Else
{
@ Require ('showpass. php'); // File Inclusion
}

}
Else {
Highlight_file ("index. php ");
}

?>

After reading the code, let's see what the file contains:

Http://intelligence.game.sycsec.com/showpass.php

We recommend that you use 360 to enable GBK encoding for garbled characters in Firefox.

 

It is here, but I cannot see it. We can use the following code to see what is written and use the following code.


$ F = $ _ post [file]; // The parameter for receiving the variable for receiving post data is file.
$ STR = $ F. ". php"; // character concatenation. This is a suffix.
@ Require $ STR; // File Inclusion

Payloads: file = PHP: // filter/read = convert. base64-encode/resource = showpass

It is a piece of base64. Go to the code to get the flag.

Master Jiang's secret

The question is that we can find study.txt in this C drive, which may be flag.

No error found after opening

After thinking for a while, you can think of constructing links to read local files.

As a result, I accidentally discovered Master Jiang's secret ~

Meng's platelet (WP provided by Yi Lang)

A picture can be either an image or a compressed package. How can we determine if it is a compressed package? use Notepad ++ to open the image.

Why don't we see the problem? Ctrl + F is there any flags or other keywords in quick search, because they store what we need?

Flag.txt + xxx.jpg think it is a compressed package, so I changed the suffix to .zip to find out how long it was !!! Actually feasible

If you see flag.txt, open it directly.

What am I about Nima ....

A little bit of thinking, looking at pictures and Buddhism, Baidu Yibo

You can use this encryption method to decrypt the address online:

Http://www.keyfc.net/bbs/tools/tudoucode.aspx

This stuff won't be used either. So I am confused. Finally, I have a tutorial on how to use it.

Then

Fo Yue: I was told that I was pregnant, even when I was pregnant, and when I was pregnant, I was told that I was always pregnant. if the death of Yi RuO passes away, all the neighborhood will be able to escape the curse without fear.

Click the true meaning of Shen wufo in the second sentence of the Buddhist family to get the flag.

 

 

Xiaoshuai is round and round. Do you want to either? (WP provided by xiaojinxing QQ: 2632041167 everyone is harassing him !)

# Sender

Binwalk, found to be a RAR

Change the suffix and decompress it directly to 666.jpg. Open it and find that there is a string of brainfuck statements above,

** 010 ** open it. If you do not use ** notepad **, an error will occur. After 010 is opened, copy the brainfuck statement at the end.

> '''
> ++ [-> ++ <]> ++. ++. <++ [-> ----<]> ------. <++
> ++ [-> ++ <]> ++. <++ + [-> -- <]> ---...... ---------. <
> ++ [-> -- <]> ----...... <++ [-> ++ <] ++. <+
> ++ [-> ---- <]> -. ++. ++. --------. <++ [-> ++ <]> ++ ..
> .. <++ + [-> ---- <]> --. ++. <++ [-> --- <]> ---. <++ [-> ++
> <]> +. <++ [-> --- ----- <]> ---------. <++ [-> ++ <]
> ++. <++ + [-> ---- <]> ------.. ++. ++. ++. <++ [
>-> ----<]> -----. <++ [-> ++ <]> +. <++ [-> ++ <]> ++. <++ [->-
> ----- --- <]> --. <++ [-> ++ <] ++. <
> '''

Get * SYC {hhhh_bbbbbbrainfuuuck_y0u _ got_it!} through online tool decoding !} *

Act 5, codenamed geek: damaged image (WP provided by xiaojinxing)

Run the same binwalk and find many things.
Then
'''
Foremost file name // restore the file in the image
'''
There is a flag.txt in the obtained file, and the flag is in it.

-*---------------------- Stop ------------------------*-

Rose CTF Team (RDBMS): A cainiao team composed of many CTF professionals, including various out-of-the-box features (many sisters)

GROUP: 814021502

Public Account of the studio: hawlgzs is responsible for designing logos and posters.

Welcome to join us for discussion and learning ~

 

Big challenges of SYC: writeup

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.