Nctf Writeups
NCTF
2022 competition
guide
binwalk
GitHub repositories
SQL injection
challenges
Join the NCTF 2022 competition and get ready to put your skills to the test! The summary outlines essential resources such as binwalk, GitHub repositories, and SQL injection techniques to help you conquer the challenges. Get started today and showcase your talents on the global stage!
challenges
buuctf online judge
hints and tools
binwalk
ayacms rce in nctf 2022? how to identify the cms? and how the fuck did those guys identify the shit from that damn website (bing-upms)?
answer: they are both busting common web directories. can be induced by common repo structures.
baby-aes for crypto signin?
zsteg for solving that png problem?
normal sql injection, not for denodb
huli: interesting blog where denodb 0day came from
some z3 code, which does not but angr solved the problem
from z3 import *
=0x162AEB99F80DD8EF8C82AFADBA2E087A
data1=0x47C9F2ACA92F6476BE7F0A6DC89F4305
data2=0x33B57575
data3=[]
answer=[]
flag1=[0x7e,0x1f,0x19,0x75]
key=Solver()
solver=[Int('flag%d'%i) for i in range(36)]
flagfor i in range(16):
>>8*i)&0xff)
answer.append((data1for i in range(16):
>>8*i)&0xff)
answer.append((data2for i in range(4):
>>8*i)&0xff)
answer.append((data3print(answer)
for i in range(0,9):
=key[3]
v3=flag[4*i+3]
v4=key[0]
v5=flag[4*i]
v6=flag[4*i+1]
v7=key[1]
v8=flag[4*i+2]
v9=(v6 + v4) * (key[0] + v3)
v10=key[2]
v11= v3 * (v6 + v7)
v12 = (v3 + v11) * (v7 - v4)
v13 = v4 * (v11 - v5)
v14 = v5 * (v9 + v4)
v15 +v10+v13-v12==answer[4*i])
solver.add(v14* (v8 - v3) + v12==answer[4*i+1])
solver.add(v6 + v14==answer[4*i+2])
solver.add(v15 * (v8 - v3) + (v8 + v5) * (v9 - v6) + v10 - v15==answer[4*i+3])
solver.add(v6 if solver.check()==sat:
=solver.model()
m= []
rex for i in range(34):
rex.append(m[flag[i]].as_long())print(rex)
else:
print("n0")
writeups
saying this is complete for 2022 nctf?
don’t know when it is, but i remember i have seen this shit: katastros’s nctf writeup