Stroke experience--the first Henan University information Security and offensive contest

Source: Internet
Author: User
Tags ming rounds

DAY-1

Come up actually has the choice question, each 100 choice question, has the multi-choice, also has the typo, the real pit. At the beginning of the game someone in the selection question bank, and the organizer did a py deal, how they anticipate ... (The team that finally has the question bank is actually higher than 100 points)

Problem solving + infiltration of public host mode, I am responsible for solving problems, the other two people infiltration of the host. Finally took a total of two public host, learn the brother one to take, one is upload loophole, another is the successful use of cve-2014-6271.

First question

gave the string \u606d\u559c\u60a8\uff01\u006b\u0065\u0079\u007b\u0074\u0068\u0065\u0020\u0066\u0069\u0072\u0073\u0074\ u0020\u006b\u0065\u0079\u007d

Don't think,Unicode encoding

Key{the First Key}

Second question

Hint Masonic, pigsty code.

Corresponding decryption

Key{this is ISCC}

Third question

XOR or encryption

00000100001000001101000001100001010

Then the key large, converted into a 7-bit ascii:11011001100001111001011001111100101

XOR or operation

0110111001101001011010000110000101101111

ASCII conversion to character: Nihao

Key{nihao}

Question Fourth

Caesar Password

E6z9i~]8r~u~qhe{rny{qxg~qnq{^xvlrxlp^xi5q6q6sky8juaa

Are all strings that can be displayed, it should be Caesar.

A Caesar script that was written 127 times ago, dropped into python and burst into a base64 (should have been moved 2 times)

a2v5ezy4nzqzmdawnjuwmtczmjmwztrhnthlzte1m2m2ogu4fq==

Decrypt
Key{68743000650173230e4a58ee153c68e8}

Question Fifth

Xiao Ming invaded the site after the administrator's ciphertext, because too happy hand a shake to delete a part of the redaction, only the former ten d9ddd1800f, Xiao Ming according to social workers know the password habits of the administrator is 4 digit number plus the letter, can you help Xiao Ming recover the hash value of the password? Answer submission format:key{xxxxxx}--- score

(did not make out) train of thought some, constructs a 4-digit letter + number dictionary, the batch MD5 encrypts, the collision first 10 bit whether matches. At that time the internet is too slag python download hashlib, stranded.

Question Sixth

The topic says to be cracked a file, attachment opens after is an APK structure. Try to revert to apk, not installed (later found the emulator is broken).

Mainly looked at the layout of the directory, found that Help.xml modified time than the other one year later, Notepad opened to find the flag

KEY{2016_KEY_HELP}

Question Seventh

"I drew a picture of it, who knows what it is?" ”

Binary Viewer open Look, the front is very regular, there is no hidden features. Drag to the bottom to see a string of characters:& #107;& #101;& #121;& #123;& #121;& #111;& #117;& #32;& #97;& #114; & #101;& #32;& #114;& #105;& #103;& #104;& #116;& #125;

At first, the submission format is key{},k and the E-letter ordinal difference is 6,e and y is 20, all correspond to, and then first write the letter range. Other non-letter based on location plus spaces and {}, form the submission format.

When I look at it, I think of it. 107 is actually the number of the 10 binary representation of K,%d becomes the%c output.

Key{you_are_right}

Question Tenth

An APK reverse. Restore a bit, then the simulator is broken, can not be used. Throw it in the GDA and look inside. Just saw mainactivity, found the key.

Feelings of the person or the first write the password into the program, and then make a comparison, in the investigation I will not use tools ...

Question 19th

http://172.16.2.253:8005/safrrgtwsgvwweb05/hello.php

This is the Web check-in question, click into the URL inside the two ll will change, change or will jump back. Open the Burp, and then change, found that the location of the record site more than a hello.php, the response packet header has key.

DAY-2

A total of 12 rounds, was beaten one day, bad luck, was the first to delete the site, the longest time to downtime. Finally recovered, the teammates over-reinforced. has been counted down, buckle to the bottom of the first. After dinner the reinforcement rules were almost modified, but the defense did not clean the back door. The 10th round found the WEB4 host on the STRUTS2 vulnerability, successful use, began harvesting, 56 teams can reap more than 40 teams. A flag of 5 points, Harvest 2 rounds, recover more than 500 points, the end of milk a wave, not the countdown is good.

Lack of experience, unaware that there will be a manual black-out station to make an outage. Manual too slow, no preparation script, suffer.

As a hobby for a year, the first time to fight and defend, heavy participation.

Stroke experience--the first Henan University information Security and offensive contest

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.