Reprinted from: http://blog.sina.com.cn/s/blog_613fee860100yhyz.html1. The Ctxsys user needs to be unlocked in order to obtain the operation rights of the CTX_DDL package.Enter the system user, enter the following command to unlock the Ctxsys userAlter user Ctxsys account unlock;Then assign the operation permissions of the CTX_DDL package to the CTFs user.Also under System users, enter the following command to give the target user CTX_DDL package oper
:193.95.68.245,port:81, according to the tip of the topic MD5, the submission is done. PS: File is a trojan, more concise method can be thrown to a variety of online Trojan testing site to try, do not have their own analysis. Lazy people must.MISC Look CloserThis problem also only gives a RAR file,: Https://github.com/ctfs/write-ups/blob/master/pwnium-ctf-2014/look-closer/Misc1.rar?raw=true), without any hint. After downloading, we found unable to ope
solution process:
-Bash-3.2 $ df-hFilesystem size used avail capacity Mounted on
/Dev/dsk/c0t0d0s0 8.1G 3.9G 4.1G 49%/
/Devices 0 K 0 K 0 K 0%/devices
Ctfs 0 K 0 K 0 K 0%/system/contract
Proc 0 K 0 K 0 K 0%/proc
Mnttab 0 K 0 K 0 K 0%/etc/mnttab
Swap 760 M 980 K 759 M 1%/etc/svc/volatile
Objfs 0 K 0 K 0 K 0%/system/object
Sharefs 0 K 0 K 0 K 0%/etc/dfs/sharetab
/Usr/lib/libc/libc_hwcap1.so.1
8.1G 3.9G 4.1G 49%/lib/libc. so.1
Fd 0 K 0 K 0 K 0%/dev/fd
the ORACLE Installation interface, df-h was used to check SWAP usage in the new window, it was found that SWAP was quickly used.Solution: on MOS, it is found that swap is insufficient and swap is temporarily increased.
# Swap-lSwapfile dev swaplo blocks free/Dev/dsk/c0t0d0s1 33,1 8 1076344 232800# Mkfile 3g/swap# Swap-a/swap# Swap-lSwapfile dev swaplo blocks free/Dev/dsk/c0t0d0s1 33,1 8 1076344 234696/Swap-8 6291448 5679544Delete temporary swap ---- No more after restart.# Swap-d/swap# Swap-l#
solution process:
-Bash-3.2 $ df-hFilesystem size used avail capacity Mounted on
/Dev/dsk/c0t0d0s0 8.1G 3.9G 4.1G 49%/
/Devices 0 K 0 K 0 K 0%/devices
Ctfs 0 K 0 K 0 K 0%/system/contract
Proc 0 K 0 K 0 K 0%/proc
Mnttab 0 K 0 K 0 K 0%/etc/mnttab
Swap 760 M 980 K 759 M 1%/etc/svc/volatile
Objfs 0 K 0 K 0 K 0%/system/object
Sharefs 0 K 0 K 0 K 0%/etc/dfs/sharetab
/Usr/lib/libc/libc_hwcap1.so.1
8.1G 3.9G 4.1G 49%/lib/libc. so.1
Fd 0 K 0 K 0 K 0%/dev/fd
DfT again understand
2015.12.18
Before learning "signal and system", for the use of FFT () function analysis of discrete, continuous time signal spectrum out of the result has been a smattering of knowledge, this semester learned "digital signal processing", learning the discrete Fourier transform (DFT), the previous written procedures to do further understanding.
Before this, the CTFs, Dtfs, Ctft, DTFT formulas are listed to facilitate understanding:
Source: Cyber Security ChallengeTitle: CrackmeType: ReverseScore: 120Difficulty: medium (difficult to easy three levels)Description: we found this binary, but we lost the password. Retrieve it for us.Topic Links: https://github.com/ctfs/write-ups-2015/tree/master/cyber-security-challenge-2015/reverse-engineering/ Reverse-that-binaryAnswer: Tnvrzsb0agugv2hhbgvz???Problem Solving Ideas:Take a look at the file format, Linux 64-bit programPut it in Ida.
through the above method, and then find a flag in the root directory. After reading the practice of foreigners, it is really easy to use. we can use bash, bb, and z. php. the content of bb is ls/, cat/f *, which is simple and direct 0 0.0x02 Kummerkasten Our Admin is a little sad this time of the year. Maybe you can cheer him up at this site http: // 136.243.194.46/Please note: This challenge does not follow the flag format. Hints: To build the flag, concatenate both pa
filled with files, there is still available disk capacity, but no more files can be stored.
You can see the default output example of Solaris in Listing 4.
Listing 4. Solaris default output$ DF/(/Dev/DSK/c0t0d0s0): 14877208 blocks 914042 files/Devices (/devices): 0 blocks 0 files/System/Contract (ctfs): 0 blocks 2147483618 files/Proc (Proc): 0 blocks 16109 files/Etc/mnttab: 0 blocks 0 files/Etc/svc/volatile (SWAP): 5737216 blocks 147177 files/Syst
Sun uses the following naming method to define the logical device name:/Dev/[R] DSK/cxtxdxsxC: Logical Controller number (Logical Controller)T: Physical Bus Target numberD: disk or logical unit number (Lun)S: Partition Number
========================================================== ========================
# DF/(/Dev/DSK/c1t0d0s0): 56154140 pieces of 3728890 files/Devices (/devices): 0 0 files/System/Contract (ctfs): 0 blocks of 2147483615 files/
0x00 Introduction
In Getting started with the C language, we all know a common sense: the memory that is dynamically requested via malloc () is released via Free (), and what happens if the heap memory is freed after the program is improperly designed. This seems like a stupid operation, but double free is a very common binary vulnerability in modern software.
I will use an example to illustrate the possible hazards of double free. This example was once a 0CTF game. CTF competition It is one
Contact Us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.