CTF校队暑期练习2021.7.2
CTF题目 July. 2nd 2021
[Easy] [Misc] Static ain’t always noise
Can you look at the data in this binary: static? This BASH script might help!
使用strings static
命令查看static文件中的字符串,在其中找到flag。
[Easy] [Reverse] keygenme-py
下载下来一个.py文件:keygenme-trial.py
打开命令行运行python
进入交互界面:
题目重点在check_key函数。依次输入以下代码求得SHA256值,再按函数中的顺序取字符构造出flag。
|
|
[Medium] [Web] Scavenger Hunt
There is some interesting information hidden around this site http://mercury.picoctf.net:5080/. Can you find it?
*Hint: You should have enough hints to find the files, don’t run a brute forcer.
flag被分成五段。
- 第一段在js文件里。
- 第二段在css文件里。
- 第三段在robots.txt里。
- 第四段在.htaccess里。
- 第五段在.DS_Store里。
[Medium] [Web] Some Assembly Required 1
打开F12看下网络,flag就在JIFxzHyW8W文件里面。
[Medium] [Crypto] Easy Peasy
A one-time pad is unbreakable, but can you manage to recover the flag? (Wrap with picoCTF{})
nc mercury.picoctf.net 41934
otp.py*Hint: Maybe there’s a way to make this a 2x pad.
下载下来一个.py文件:otp.py
// TODO
- Author: HuaHuaY
- Link: https://www.huahuaorz.com/post/CTF%E6%A0%A1%E9%98%9F%E7%BB%83%E4%B9%A0/CTF%E6%A0%A1%E9%98%9F%E6%9A%91%E6%9C%9F%E7%BB%83%E4%B9%A02021.7.2/
- License: This work is under a 知识共享署名-非商业性使用-禁止演绎 4.0 国际许可协议. Kindly fulfill the requirements of the aforementioned License when adapting or creating a derivative of this work.