NCTF-Writeup

本文详细介绍了参与南京邮电大学NCTF网络攻防训练平台的解题过程,涵盖Web、Crypto和Misc等多个类别,包括SQL注入、PHP解码、Cookie利用、哈希碰撞等技巧,通过实战解析提升网络安全技能。

南京邮电大学网络攻防训练平台

https://cgctf.nuptsast.com


以下按本人做题的顺序排序

剩余题目待补完。。。


【Web】
1.签到题
nctf{flag_admiaanaaaaaaaaaaa}
网页源码

2.单身二十年
nctf{yougotit_script_now}
由于页面自动跳转,使用工具查看search_key.php页面源码即可

3.SQL注入1
nctf{ni_ye_hui_sql?}
考虑到pass使用md5加密,故在user上注入。由于使用trim去除空格,而mysql除了--外还可使用#作为注释,参考source中SQL写法注入即可

4.SQL注入2
ntcf{union_select_is_wtf}
pass仍然使用md5加密,仍在user上注入。考虑到题目提示的union,联想到令user为空,union select 一段md5值(如123456的md5值),再在pass栏输入原值(123456)即可

5.签到题2
nctf{follow_me_to_exploit}
输入框限制10单位长度,F12审查元素将其改为15后,输入提示即可

6.这题不是WEB
nctf{photo_can_also_hid3_msg}
拖下gif,使用十六进制查看器在文件末尾找到

7.php decode
nctf{gzip_base64_hhhhhh}
将php文件中eval改成echo,执行即可

8.AAencode
nctf{javascript_aaencode}
由于页面读取乱码,将txt文件下载下来,分离出最后一句。先执行前面的,再执行最后一句,放入浏览器console执行即可

9.COOKIE
nctf{cookie_is_different_from_session}
使用fiddler查看发送的数据报文头部,复制内容并将cookie中的login的值0改为1,提交观察返回即可

1

### NCTF Web Challenges and Resources NCTF (National Cybersecurity Talent Competition) is a well-known competition that focuses on cybersecurity skills, including web security challenges. These challenges are designed to test participants' abilities in identifying vulnerabilities within web applications and exploiting them ethically. The website mentioned in the reference provides access to various Capture The Flag (CTF) competitions where contestants can engage with different types of challenges, such as web-based ones[^1]. Participants often encounter tasks involving SQL injection, cross-site scripting (XSS), command injection, insecure deserialization, and more advanced techniques like bypassing authentication mechanisms or exploiting server-side request forgery (SSRF). For those interested specifically in NCTF's web-related content, it’s recommended to explore past challenge archives from official sources when available. Additionally, there exist several platforms hosting similar CTF-style exercises which could serve as supplementary material: #### Example Code for Testing XSS Vulnerability Below demonstrates how one might check whether an input field allows reflected Cross-Site Scripting attacks. ```javascript // Simple payload used during testing phase alert('This shows potential vulnerability'); ``` Such scripts should only execute under conditions indicating improper sanitization processes at play—highlighting areas needing remediation efforts before deployment into production environments.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值