├── .gitattributes ├── attachments ├── misc │ ├── 不良劫的附件.zip │ ├── 特殊流量2的附件.zip │ ├── PixMatrix的附件.zip │ └── gza_Cracker的附件.zip ├── crypto │ ├── ddd的附件.zip │ ├── Mypow的附件.zip │ ├── QAQTAT的附件.zip │ ├── easyCrypto的附件.zip │ └── Another+leak+of+LCG的附件.zip ├── pwn │ ├── EZheap_2的附件.zip │ └── Inequable_Canary的附件.zip ├── reverse │ ├── zistel的附件.zip │ ├── bouquet的附件.zip │ └── go_bytes的附件.zip └── ds │ └── ds-findphone的附件.zip └── README.md /.gitattributes: -------------------------------------------------------------------------------- 1 | # Auto detect text files and perform LF normalization 2 | * text=auto 3 | -------------------------------------------------------------------------------- /attachments/misc/不良劫的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/misc/不良劫的附件.zip -------------------------------------------------------------------------------- /attachments/crypto/ddd的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/crypto/ddd的附件.zip -------------------------------------------------------------------------------- /attachments/misc/特殊流量2的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/misc/特殊流量2的附件.zip -------------------------------------------------------------------------------- /attachments/crypto/Mypow的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/crypto/Mypow的附件.zip -------------------------------------------------------------------------------- /attachments/crypto/QAQTAT的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/crypto/QAQTAT的附件.zip -------------------------------------------------------------------------------- /attachments/misc/PixMatrix的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/misc/PixMatrix的附件.zip -------------------------------------------------------------------------------- /attachments/pwn/EZheap_2的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/pwn/EZheap_2的附件.zip -------------------------------------------------------------------------------- /attachments/reverse/zistel的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/reverse/zistel的附件.zip -------------------------------------------------------------------------------- /attachments/ds/ds-findphone的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/ds/ds-findphone的附件.zip -------------------------------------------------------------------------------- /attachments/misc/gza_Cracker的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/misc/gza_Cracker的附件.zip -------------------------------------------------------------------------------- /attachments/reverse/bouquet的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/reverse/bouquet的附件.zip -------------------------------------------------------------------------------- /attachments/reverse/go_bytes的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/reverse/go_bytes的附件.zip -------------------------------------------------------------------------------- /attachments/crypto/easyCrypto的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/crypto/easyCrypto的附件.zip -------------------------------------------------------------------------------- /attachments/pwn/Inequable_Canary的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/pwn/Inequable_Canary的附件.zip -------------------------------------------------------------------------------- /attachments/crypto/Another+leak+of+LCG的附件.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/CTF-Archives/2024-chb/main/attachments/crypto/Another+leak+of+LCG的附件.zip -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # 2024-chb 2 | 3 | 2024 年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 4 | 5 | ## WEB 6 | 7 | ### 速算比赛 8 | 9 | 你能在连续在3秒内解出30道数学题吗 10 | 11 | ### Sal的图集 12 | 13 | Sal有好多图片,一起来看看吧!能查到什么好东西? 14 | 15 | ### popmart 16 | 17 | pop也需要命令 18 | 19 | ## PWN 20 | 21 | ### EZheap_2 22 | 23 | ezheap!ezheap 24 | 25 | ### Inequable_Canary 26 | 27 | 除了常规的利用格式化字符串泄露出canary 还可以从栈帧结束的最后异或检查canary来入手 fs:28对应的是pthread_self中存储canary的地址 如果将其修改为特定值 我们就可以在覆盖canary的时候覆盖为特定值 从而绕过canary 28 | 29 | ## DS 30 | 31 | ### ds-findphone 32 | 33 | 现在有一个数据文件 data.txt,现在需要作为数据分析人员的你对该数据文件进行分析,并进行数据识别与分类。该文件中只有手机号(phone) 这一类敏感信息,需要你参考附件中《个人信息数据规范文档.pdf》中“数据上传规范”说明的要求识别出这一类敏感数据,并对其进行数据分类到类别“phone”中。最终将进行了数据识别与分类后的内容保存到 csv 文件中(文件编码 utf-8),并将该文件上传至该题的校验平台(在该校验平台里可以下载该题的示例文件 example.csv,可作为该题的格式参考),校验达标即可拿到 flag。 34 | 35 | ## MISC 36 | 37 | ### gza_Cracker 38 | 39 | 哥斯拉密钥爆破和哥斯拉流量解密 40 | 41 | ### 不良劫 42 | 43 | 面具之下,图片之上,便是旗帜。 44 | 45 | ### 特殊流量2 46 | 47 | 不是很难的流量分析,你可以的! 48 | 49 | ### PixMatrix 50 | 51 | 无 52 | 53 | ### 马赛克 54 | 55 | 我的密码好像被遮住了,你可以帮我恢复吗? 56 | 57 | ### flag^galf 58 | 59 | Hacker,what are you doing? 60 | 61 | ## CRYPTO 62 | 63 | ### ddd 64 | 65 | d是随机生成的 ,要通过n、e通过连分数wiener攻击直接反推d 66 | 67 | ### QAQTAT 68 | 69 | My teacher told us that matrices are great creations. Btw, QAQ seems cute right? 70 | 71 | ### Another leak of LCG 72 | 73 | Yet another type of LCG's leak bits ! 74 | 75 | ### easyCrypto 76 | 77 | 貌似加密了?一点都不安全。 78 | 79 | ### Mypow 80 | 81 | 无 82 | 83 | ## REVERSE 84 | 85 | ### go_bytes 86 | 87 | easy go! 88 | 89 | ### bouquet 90 | 91 | 简单的花指令去除,二叉树的中序、后序、层次遍历代码的识别 92 | 93 | ### zistel 94 | 95 | zig语言的反编译有点难。 --------------------------------------------------------------------------------