├── raw-api-data ├── summary.json ├── f9ba4ce3c37b51857fa195ce1eeecb72.json ├── 6f48f0ac82b486fc034eed607ee01d01.json ├── 4925dc76e06f5a37608a45c43a85f6ce.json ├── d6ec408520726f34d5feef4c77b00007.json ├── 3dee8e1fefacfc19257c13abf9daa5f3.json ├── 98c9838c62d6397a13008f5c3ba5eaa1.json ├── a59b4babf83de05cc35a4d710126aabd.json ├── 2fd2c782365c5f35e325a6a7413b71fb.json ├── 4068341c35fb0ece0fe3950e588c1435.json ├── 5552c5250d3d1fb5f2c83ea138f359ae.json ├── 27c2d11c2a1b96281f802af67a1f4d12.json ├── e76c8a2426cab8f7fa947665e681c61a.json ├── a4df1ae3b58ca3ddcc09095c1b8a49fe.json └── checkpoints.json └── README.md /raw-api-data/summary.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311394.542213, 6 | "data": [ 7 | { 8 | "direction": "二进制安全", 9 | "total": 3, 10 | "solved_quantity": 0 11 | }, 12 | { 13 | "direction": "密码学", 14 | "total": 2, 15 | "solved_quantity": 0 16 | }, 17 | { 18 | "direction": "数据安全", 19 | "total": 2, 20 | "solved_quantity": 1 21 | }, 22 | { 23 | "direction": "新技术应用", 24 | "total": 4, 25 | "solved_quantity": 1 26 | }, 27 | { 28 | "direction": "逆向安全", 29 | "total": 2, 30 | "solved_quantity": 1 31 | } 32 | ] 33 | } -------------------------------------------------------------------------------- /raw-api-data/f9ba4ce3c37b51857fa195ce1eeecb72.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311648.34769, 6 | "data": { 7 | "resource_id": "f9ba4ce3c37b51857fa195ce1eeecb72", 8 | "name": "python逆向分析", 9 | "desc": "compress\n一个幽灵,一个EOL的幽灵在代码审计中游荡。", 10 | "attachment": { 11 | "name": "python逆向分析.zip", 12 | "url": "/cpms/oj/practice_attachment/a502520fe6574a8dbc54937706b79ef9.zip", 13 | "md5": "43b74415d95035fd03ce31a5467b4764" 14 | }, 15 | "with_scene": false, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 2 23 | } 24 | } -------------------------------------------------------------------------------- /raw-api-data/6f48f0ac82b486fc034eed607ee01d01.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311509.434277, 6 | "data": { 7 | "resource_id": "6f48f0ac82b486fc034eed607ee01d01", 8 | "name": "RSA加密分析", 9 | "desc": "equations\nrsa真的安全吗", 10 | "attachment": { 11 | "name": "b9f78ade9b8948fb8dab35c1db0f9299.zip", 12 | "url": "/cpms/oj/practice_attachment/99a0e368ef5d43d3b19f7a6f581a0c3d.zip", 13 | "md5": "675abffc4a38c1c843ed63297103c103" 14 | }, 15 | "with_scene": false, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 0 23 | } 24 | } -------------------------------------------------------------------------------- /raw-api-data/4925dc76e06f5a37608a45c43a85f6ce.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311617.031705, 6 | "data": { 7 | "resource_id": "4925dc76e06f5a37608a45c43a85f6ce", 8 | "name": "邮件数据分析", 9 | "desc": "Easy_Data\n公司的DLP软件报警了,并上传了一段流量。你能帮bob分析下为什么会产生报警么?", 10 | "attachment": { 11 | "name": "misc_easy_data.zip", 12 | "url": "/ct/upload/other/57edf1fbb5056961a908b8aeff0ac1e9.zip", 13 | "md5": "b882e83622d005e337cec1fe59af6a8f" 14 | }, 15 | "with_scene": false, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": true, 19 | "solved_score": 118.06, 20 | "solved_rank": 11, 21 | "recycle": null, 22 | "flag_type": 0 23 | } 24 | } -------------------------------------------------------------------------------- /raw-api-data/d6ec408520726f34d5feef4c77b00007.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311901.64726, 6 | "data": { 7 | "resource_id": "d6ec408520726f34d5feef4c77b00007", 8 | "name": "5G网络隐私保护", 9 | "desc": "Get_supi\n\n在某些场景下,LTE网络中用户的IMSI会在空口暴露,5G网络是如何进行隐私保护的?网络侧如何得到用户的SUPI?(提交请加上flag{})", 10 | "attachment": { 11 | "name": "5G网络隐私保护.zip", 12 | "url": "/cpms/oj/practice_attachment/6b8aa8c167ab427ca3ac1b20012d2db3.zip", 13 | "md5": "547afc69d6635e73d97e171d407a141e" 14 | }, 15 | "with_scene": false, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": true, 19 | "solved_score": 433.33, 20 | "solved_rank": 51, 21 | "recycle": null, 22 | "flag_type": 2 23 | } 24 | } -------------------------------------------------------------------------------- /raw-api-data/3dee8e1fefacfc19257c13abf9daa5f3.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311869.295138, 6 | "data": { 7 | "resource_id": "3dee8e1fefacfc19257c13abf9daa5f3", 8 | "name": "网络通信流量分析", 9 | "desc": "socket\n小鼎同学在日常运维排查中发现了异常通信流量,通过初步定位分析,他获得了客户端、服务端程序以及相关流量,请帮他找出其中异常敏感数据!", 10 | "attachment": { 11 | "name": "0705a3b79ea5468ab52dce250a9452a6.zip", 12 | "url": "/cpms/oj/practice_attachment/a5f23b234e5d474fb1c834138e3a57f9.zip", 13 | "md5": "12807b1f2b06766acc1be553b8b78e78" 14 | }, 15 | "with_scene": false, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": true, 19 | "solved_score": 89.58, 20 | "solved_rank": 52, 21 | "recycle": null, 22 | "flag_type": 0 23 | } 24 | } -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # 第四届 网鼎杯 半决赛 专项技术挑战赛 2 | 3 | ## 二进制安全 - BinarySecurity 4 | 5 | ### 二进制漏洞挖掘 - cardmaster 6 | 7 | > 请卡牌大师们找出这台切牌机中的漏洞并获取 flag 8 | 9 | ### 系统内核漏洞挖掘 - Generic_kernel_shellcode 10 | 11 | > Write a generic linux kernel shellcode? 12 | 13 | ### 新编译技术漏洞 - jitlover 14 | 15 | > 这是一台不完全的 JIT 虚拟机,请找到其中的漏洞以获取 flag 16 | 17 | ## 密码学 - Cryptography 18 | 19 | ### RSA 加密分析 - equations 20 | 21 | > rsa 真的安全吗 22 | 23 | ### 序列密码加密分析 - noise 24 | 25 | > Let me tell you a story about noisy-nfsr. 26 | 27 | ## 数据安全 - DataSecurity 28 | 29 | ### 邮件数据分析 - Easy_Data 30 | 31 | > 公司的 DLP 软件报警了,并上传了一段流量。你能帮 bob 分析下为什么会产生报警么? 32 | 33 | ### 数据安全协议分析 - Never Finish 34 | 35 | > 自定义 TLS 协议可能会存在安全问题,本题实现 TLS 的 Hello 部分,再利用 AES CFB 模式的性质伪造签名后的消息。 36 | > 37 | > 端口为 23333,nc 正常无法连接上,需要根据 server 实现客户端链接。 38 | 39 | ## 新技术应用 - AdvanceTechnology 40 | 41 | ### 车联网日志分析 - V2XLogAnalysis 42 | 43 | > 车内日志的秘密,日志也能注入? 44 | 45 | ### IOT 应用容器漏洞 - signin 46 | 47 | > 难道这是真正的登陆入口吗? 48 | 49 | ### IOT 网络协议分析 - babyRTP 50 | 51 | > 这是一个双端都会推流的服务 52 | 53 | ### 5G 网络隐私保护 - Get_supi 54 | 55 | > 在某些场景下,LTE 网络中用户的 IMSI 会在空口暴露,5G 网络是如何进行隐私保护的?网络侧如何得到用户的 SUPI?(提交请加上 flag{}) 56 | 57 | ## 逆向安全 - ReverseSecurity 58 | 59 | ### python逆向分析 - compress 60 | 61 | > 一个幽灵,一个EOL的幽灵在代码审计中游荡。 62 | 63 | ### 网络通信流量分析 - socket 64 | 65 | > 小鼎同学在日常运维排查中发现了异常通信流量,通过初步定位分析,他获得了客户端、服务端程序以及相关流量,请帮他找出其中异常敏感数据! 66 | -------------------------------------------------------------------------------- /raw-api-data/98c9838c62d6397a13008f5c3ba5eaa1.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311757.425765, 6 | "data": { 7 | "resource_id": "98c9838c62d6397a13008f5c3ba5eaa1", 8 | "name": "序列密码加密分析", 9 | "desc": "noise\nLet me tell you a story about noisy-nfsr.", 10 | "attachment": { 11 | "name": "attachments.zip", 12 | "url": "/ct/upload/other/d17b9250825ee0c02cfd59fefce537d2.zip", 13 | "md5": "9ee07e809fd25e7c498789c6429110cf" 14 | }, 15 | "with_scene": true, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 1, 23 | "scene_config": { 24 | "id": "af6e385f077f4ecbbb99a2e5b9c36d0a", 25 | "cscene": null, 26 | "name": "序列密码加密分析", 27 | "reference_type": 302, 28 | "scene_config": { 29 | "topology": { 30 | "scene": { 31 | "eid": "4d3273f1ba3d4a08a85cf722791563bb", 32 | "name": "序列密码加密分析", 33 | "description": "" 34 | } 35 | } 36 | } 37 | } 38 | } 39 | } -------------------------------------------------------------------------------- /raw-api-data/a59b4babf83de05cc35a4d710126aabd.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311573.508412, 6 | "data": { 7 | "resource_id": "a59b4babf83de05cc35a4d710126aabd", 8 | "name": "车联网日志分析", 9 | "desc": "车内日志的秘密,日志也能注入?", 10 | "attachment": { 11 | "name": "55ae699fe15e4eb58dbfff74092d1826.zip", 12 | "url": "/cpms/oj/practice_attachment/b1935840442e4dd796ab1a564dc32aa9.zip", 13 | "md5": "b3a480ff4fa05ad6f0368632fd4bbfc6" 14 | }, 15 | "with_scene": true, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 1, 23 | "scene_config": { 24 | "id": "df40241e229f4c24b24c4b0a50762e1a", 25 | "cscene": null, 26 | "name": "车联网日志分析", 27 | "reference_type": 302, 28 | "scene_config": { 29 | "topology": { 30 | "scene": { 31 | "eid": "1898e07c01de421fb825c59aae11fa70", 32 | "name": "车联网日志分析", 33 | "description": "" 34 | } 35 | } 36 | } 37 | } 38 | } 39 | } -------------------------------------------------------------------------------- /raw-api-data/2fd2c782365c5f35e325a6a7413b71fb.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311851.012546, 6 | "data": { 7 | "resource_id": "2fd2c782365c5f35e325a6a7413b71fb", 8 | "name": "IOT网络协议分析", 9 | "desc": "babyRTP\n这是一个双端都会推流的服务", 10 | "attachment": { 11 | "name": "e7f4bbee4896463283241de2a792dc38.zip", 12 | "url": "/cpms/oj/practice_attachment/a250dee185504fb5b59078f0641b2604.zip", 13 | "md5": "1086395b7500e7b04fe649b22b24fca1" 14 | }, 15 | "with_scene": true, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 0, 23 | "scene_config": { 24 | "id": "1f8787a254084ca3bc6c3da3beeed2ab", 25 | "cscene": null, 26 | "name": "IOT网络协议分析", 27 | "reference_type": 302, 28 | "scene_config": { 29 | "topology": { 30 | "scene": { 31 | "eid": "f1f04363feb04d258fb24b6f96d66702", 32 | "name": "IOT网络协议分析", 33 | "description": "" 34 | } 35 | } 36 | } 37 | } 38 | } 39 | } -------------------------------------------------------------------------------- /raw-api-data/4068341c35fb0ece0fe3950e588c1435.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311736.880331, 6 | "data": { 7 | "resource_id": "4068341c35fb0ece0fe3950e588c1435", 8 | "name": "IOT应用容器漏洞", 9 | "desc": "signin\n难道这是真正的登陆入口吗?", 10 | "attachment": { 11 | "name": "88d1e1e8ba6c40ba8250b1c8cba39f2f.zip", 12 | "url": "/cpms/oj/practice_attachment/4079206a075a4f1c8d4f7b48e9825284.zip", 13 | "md5": "252aa502fe1e4ecd74b94c46e1a31d23" 14 | }, 15 | "with_scene": true, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 1, 23 | "scene_config": { 24 | "id": "87959f32433b410595ebf74ab2b0b02d", 25 | "cscene": null, 26 | "name": "IOT应用容器漏洞", 27 | "reference_type": 302, 28 | "scene_config": { 29 | "topology": { 30 | "scene": { 31 | "eid": "e7a199d177314eb386af689f4803a55d", 32 | "name": "IOT应用容器漏洞", 33 | "description": "" 34 | } 35 | } 36 | } 37 | } 38 | } 39 | } -------------------------------------------------------------------------------- /raw-api-data/5552c5250d3d1fb5f2c83ea138f359ae.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311669.601985, 6 | "data": { 7 | "resource_id": "5552c5250d3d1fb5f2c83ea138f359ae", 8 | "name": "二进制漏洞挖掘", 9 | "desc": "cardmaster\n请卡牌大师们找出这台切牌机中的漏洞并获取flag", 10 | "attachment": { 11 | "name": "6a4ca062e7aa489eba566b0839de1213.zip", 12 | "url": "/cpms/oj/practice_attachment/f76b323090644b81a0c76b0cfd1a5c70.zip", 13 | "md5": "001a97c9bee1f4cc5bc7f650b3def601" 14 | }, 15 | "with_scene": true, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 1, 23 | "scene_config": { 24 | "id": "e3142fef464244638e583af173cbf6e6", 25 | "cscene": null, 26 | "name": "二进制漏洞挖掘", 27 | "reference_type": 302, 28 | "scene_config": { 29 | "topology": { 30 | "scene": { 31 | "eid": "a8caac97b0ff4901ae6b15a925b71a10", 32 | "name": "二进制漏洞挖掘", 33 | "description": "" 34 | } 35 | } 36 | } 37 | } 38 | } 39 | } -------------------------------------------------------------------------------- /raw-api-data/27c2d11c2a1b96281f802af67a1f4d12.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311831.181361, 6 | "data": { 7 | "resource_id": "27c2d11c2a1b96281f802af67a1f4d12", 8 | "name": "新编译技术漏洞", 9 | "desc": "jitlover\n这是一台不完全的JIT虚拟机,请找到其中的漏洞以获取flag", 10 | "attachment": { 11 | "name": "ce834e1434804f22bb7c6deb9c01b6ab.zip", 12 | "url": "/cpms/oj/practice_attachment/482e8e5a7f814e00831c5f2e02709f97.zip", 13 | "md5": "6abe8cf7f935a85654620fb55c955b86" 14 | }, 15 | "with_scene": true, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 1, 23 | "scene_config": { 24 | "id": "23b1115c238943059d3e4af70fd00e38", 25 | "cscene": null, 26 | "name": "新编译技术漏洞", 27 | "reference_type": 302, 28 | "scene_config": { 29 | "topology": { 30 | "scene": { 31 | "eid": "5ac798cc8b54456395e38d4492d37c66", 32 | "name": "新编译技术漏洞", 33 | "description": "" 34 | } 35 | } 36 | } 37 | } 38 | } 39 | } -------------------------------------------------------------------------------- /raw-api-data/e76c8a2426cab8f7fa947665e681c61a.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311805.963118, 6 | "data": { 7 | "resource_id": "e76c8a2426cab8f7fa947665e681c61a", 8 | "name": "系统内核漏洞挖掘", 9 | "desc": "Generic_kernel_shellcode\nWrite a generic linux kernel shellcode?", 10 | "attachment": { 11 | "name": "5673aed554ce4c28af5ba213a78421f7.zip", 12 | "url": "/cpms/oj/practice_attachment/363700c248284beb94f7efd8a3a1899f.zip", 13 | "md5": "62a55eae47a94b752d9fa093518eff4c" 14 | }, 15 | "with_scene": true, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 0, 23 | "scene_config": { 24 | "id": "48072e1786ec4406b2a86cd1352a2af7", 25 | "cscene": null, 26 | "name": "系统内核漏洞挖掘", 27 | "reference_type": 302, 28 | "scene_config": { 29 | "topology": { 30 | "scene": { 31 | "eid": "06e48b9ede2f4e43b3e5e7b430ff0310", 32 | "name": "系统内核漏洞挖掘", 33 | "description": "" 34 | } 35 | } 36 | } 37 | } 38 | } 39 | } -------------------------------------------------------------------------------- /raw-api-data/a4df1ae3b58ca3ddcc09095c1b8a49fe.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311699.098224, 6 | "data": { 7 | "resource_id": "a4df1ae3b58ca3ddcc09095c1b8a49fe", 8 | "name": "数据安全协议分析", 9 | "desc": "Never Finish\n自定义TLS协议可能会存在安全问题,本题实现 TLS 的 Hello 部分,再利用 AES CFB 模式的性质伪造签名后的消息。\n\n端口为23333,nc正常无法连接上,需要根据server实现客户端链接。", 10 | "attachment": { 11 | "name": "ba3489b311cc44d1a57cd4eee1b16787.zip", 12 | "url": "/cpms/oj/practice_attachment/6cd59289661d42ca92b31363615f1704.zip", 13 | "md5": "32fded862198987b2b0a544a9f15f6a5" 14 | }, 15 | "with_scene": true, 16 | "with_scene_inst": false, 17 | "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", 18 | "is_solved": false, 19 | "solved_score": 0, 20 | "solved_rank": 0, 21 | "recycle": null, 22 | "flag_type": 1, 23 | "scene_config": { 24 | "id": "5fd0e80bff464ad1b339a95f3484ac3c", 25 | "cscene": null, 26 | "name": "数据安全协议分析", 27 | "reference_type": 302, 28 | "scene_config": { 29 | "topology": { 30 | "scene": { 31 | "eid": "0bfc664c66994e7cadeb558e1a0af4dc", 32 | "name": "数据安全协议分析", 33 | "description": "" 34 | } 35 | } 36 | } 37 | } 38 | } 39 | } -------------------------------------------------------------------------------- /raw-api-data/checkpoints.json: -------------------------------------------------------------------------------- 1 | { 2 | "code": "AD-000000", 3 | "message": "", 4 | "detail": "", 5 | "timestamp": 1732311395.068269, 6 | "data": { 7 | "total": 13, 8 | "list": [ 9 | { 10 | "resource_id": "6f48f0ac82b486fc034eed607ee01d01", 11 | "name": "RSA加密分析", 12 | "score": 596.67, 13 | "solved": 1, 14 | "direction": "密码学", 15 | "is_solved": false, 16 | "top_three": [ 17 | { 18 | "name": "NISA-CarpeDiem", 19 | "identify_key": 607, 20 | "resource_id": "ce51e747f6c734bd21ff9b8554022f22", 21 | "rank": 1 22 | } 23 | ], 24 | "is_notice": false, 25 | "unreceived_notice": false, 26 | "cd_hot_value": 100, 27 | "flag_type": 0, 28 | "online": true 29 | }, 30 | { 31 | "resource_id": "a59b4babf83de05cc35a4d710126aabd", 32 | "name": "车联网日志分析", 33 | "score": 795.56, 34 | "solved": 1, 35 | "direction": "新技术应用", 36 | "is_solved": false, 37 | "top_three": [ 38 | { 39 | "name": "noname", 40 | "identify_key": 611, 41 | "resource_id": "adac8d2da399f62100f153ea296e839e", 42 | "rank": 1 43 | } 44 | ], 45 | "is_notice": false, 46 | "unreceived_notice": false, 47 | "cd_hot_value": 100, 48 | "flag_type": 1, 49 | "online": true 50 | }, 51 | { 52 | "resource_id": "4925dc76e06f5a37608a45c43a85f6ce", 53 | "name": "邮件数据分析", 54 | "score": 25, 55 | "solved": 153, 56 | "direction": "数据安全", 57 | "is_solved": true, 58 | "top_three": [ 59 | { 60 | "name": "or4nge", 61 | "identify_key": 587, 62 | "resource_id": "1229feedce345f63e530d9a7bcf01c9b", 63 | "rank": 1 64 | }, 65 | { 66 | "name": "SSSec000", 67 | "identify_key": 596, 68 | "resource_id": "234aec31d5984e63f9ad5a2e4384a896", 69 | "rank": 2 70 | }, 71 | { 72 | "name": "0ops-2", 73 | "identify_key": 667, 74 | "resource_id": "e238b74d113f5f827228106b925f4992", 75 | "rank": 3 76 | } 77 | ], 78 | "is_notice": false, 79 | "unreceived_notice": false, 80 | "cd_hot_value": 100, 81 | "flag_type": 0, 82 | "online": true 83 | }, 84 | { 85 | "resource_id": "f9ba4ce3c37b51857fa195ce1eeecb72", 86 | "name": "python逆向分析", 87 | "score": 600, 88 | "solved": 0, 89 | "direction": "逆向安全", 90 | "is_solved": false, 91 | "top_three": [], 92 | "is_notice": false, 93 | "unreceived_notice": false, 94 | "cd_hot_value": 100, 95 | "flag_type": 2, 96 | "online": true 97 | }, 98 | { 99 | "resource_id": "5552c5250d3d1fb5f2c83ea138f359ae", 100 | "name": "二进制漏洞挖掘", 101 | "score": 412.5, 102 | "solved": 15, 103 | "direction": "二进制安全", 104 | "is_solved": false, 105 | "top_three": [ 106 | { 107 | "name": "泥巴睡觉", 108 | "identify_key": 582, 109 | "resource_id": "276635ccdb033c29f3355b85f0f591a5", 110 | "rank": 1 111 | }, 112 | { 113 | "name": "0ops", 114 | "identify_key": 514, 115 | "resource_id": "18c1d0eecd9cf2bdfc4fabe3ee5086cd", 116 | "rank": 2 117 | }, 118 | { 119 | "name": "小清华", 120 | "identify_key": 679, 121 | "resource_id": "c465ad2a80dec11b88ae0750923ec498", 122 | "rank": 3 123 | } 124 | ], 125 | "is_notice": false, 126 | "unreceived_notice": false, 127 | "cd_hot_value": 100, 128 | "flag_type": 1, 129 | "online": true 130 | }, 131 | { 132 | "resource_id": "a4df1ae3b58ca3ddcc09095c1b8a49fe", 133 | "name": "数据安全协议分析", 134 | "score": 447.5, 135 | "solved": 1, 136 | "direction": "数据安全", 137 | "is_solved": false, 138 | "top_three": [ 139 | { 140 | "name": "volcana", 141 | "identify_key": 585, 142 | "resource_id": "b6cc28c6e0f418290733b671c6804263", 143 | "rank": 1 144 | } 145 | ], 146 | "is_notice": false, 147 | "unreceived_notice": false, 148 | "cd_hot_value": 100, 149 | "flag_type": 1, 150 | "online": true 151 | }, 152 | { 153 | "resource_id": "4068341c35fb0ece0fe3950e588c1435", 154 | "name": "IOT应用容器漏洞", 155 | "score": 800, 156 | "solved": 0, 157 | "direction": "新技术应用", 158 | "is_solved": false, 159 | "top_three": [], 160 | "is_notice": false, 161 | "unreceived_notice": false, 162 | "cd_hot_value": 100, 163 | "flag_type": 1, 164 | "online": true 165 | }, 166 | { 167 | "resource_id": "98c9838c62d6397a13008f5c3ba5eaa1", 168 | "name": "序列密码加密分析", 169 | "score": 1000, 170 | "solved": 0, 171 | "direction": "密码学", 172 | "is_solved": false, 173 | "top_three": [], 174 | "is_notice": false, 175 | "unreceived_notice": false, 176 | "cd_hot_value": 100, 177 | "flag_type": 1, 178 | "online": true 179 | }, 180 | { 181 | "resource_id": "e76c8a2426cab8f7fa947665e681c61a", 182 | "name": "系统内核漏洞挖掘", 183 | "score": 988.89, 184 | "solved": 2, 185 | "direction": "二进制安全", 186 | "is_solved": false, 187 | "top_three": [ 188 | { 189 | "name": "Air2top", 190 | "identify_key": 520, 191 | "resource_id": "4fec3769b01d28f848554b1bb9e65e17", 192 | "rank": 1 193 | }, 194 | { 195 | "name": "0ops", 196 | "identify_key": 514, 197 | "resource_id": "3a40f8db647818d2b543b36e8c222746", 198 | "rank": 2 199 | } 200 | ], 201 | "is_notice": false, 202 | "unreceived_notice": false, 203 | "cd_hot_value": 100, 204 | "flag_type": 0, 205 | "online": true 206 | }, 207 | { 208 | "resource_id": "27c2d11c2a1b96281f802af67a1f4d12", 209 | "name": "新编译技术漏洞", 210 | "score": 1000, 211 | "solved": 0, 212 | "direction": "二进制安全", 213 | "is_solved": false, 214 | "top_three": [], 215 | "is_notice": false, 216 | "unreceived_notice": false, 217 | "cd_hot_value": 100, 218 | "flag_type": 1, 219 | "online": true 220 | }, 221 | { 222 | "resource_id": "2fd2c782365c5f35e325a6a7413b71fb", 223 | "name": "IOT网络协议分析", 224 | "score": 430, 225 | "solved": 8, 226 | "direction": "新技术应用", 227 | "is_solved": false, 228 | "top_three": [ 229 | { 230 | "name": "or4nge", 231 | "identify_key": 587, 232 | "resource_id": "1d79b9037725bf2faa07353982fb9796", 233 | "rank": 1 234 | }, 235 | { 236 | "name": "晚上吃什么", 237 | "identify_key": 608, 238 | "resource_id": "6440ac244749c5417acbe913d31393f0", 239 | "rank": 2 240 | }, 241 | { 242 | "name": "WXYZ", 243 | "identify_key": 542, 244 | "resource_id": "6f68eae6cfed856b7bd6f3ecb1e34728", 245 | "rank": 3 246 | } 247 | ], 248 | "is_notice": false, 249 | "unreceived_notice": false, 250 | "cd_hot_value": 100, 251 | "flag_type": 0, 252 | "online": true 253 | }, 254 | { 255 | "resource_id": "3dee8e1fefacfc19257c13abf9daa5f3", 256 | "name": "网络通信流量分析", 257 | "score": 47.92, 258 | "solved": 111, 259 | "direction": "逆向安全", 260 | "is_solved": true, 261 | "top_three": [ 262 | { 263 | "name": "天枢Dubhe", 264 | "identify_key": 598, 265 | "resource_id": "358b0c5f854af10a07a1005c7f46c226", 266 | "rank": 1 267 | }, 268 | { 269 | "name": "X0RSEC", 270 | "identify_key": 518, 271 | "resource_id": "6af0ccc898910658ce2a1d5f10ec71d7", 272 | "rank": 2 273 | }, 274 | { 275 | "name": "0ops", 276 | "identify_key": 514, 277 | "resource_id": "2fc5c9e2e65d6349bcb2ad096b0fa92e", 278 | "rank": 3 279 | } 280 | ], 281 | "is_notice": false, 282 | "unreceived_notice": false, 283 | "cd_hot_value": 100, 284 | "flag_type": 0, 285 | "online": true 286 | }, 287 | { 288 | "resource_id": "d6ec408520726f34d5feef4c77b00007", 289 | "name": "5G网络隐私保护", 290 | "score": 243.33, 291 | "solved": 107, 292 | "direction": "新技术应用", 293 | "is_solved": true, 294 | "top_three": [ 295 | { 296 | "name": "泥巴睡觉", 297 | "identify_key": 582, 298 | "resource_id": "cff157252fb8db2775c33a713d2d8ef7", 299 | "rank": 1 300 | }, 301 | { 302 | "name": "圣地亚哥皮蛋", 303 | "identify_key": 592, 304 | "resource_id": "e29a11a7deb3486b13f72f82a4716f10", 305 | "rank": 2 306 | }, 307 | { 308 | "name": "F_Cat", 309 | "identify_key": 649, 310 | "resource_id": "447c363c28d227539793e49f06c8f9e5", 311 | "rank": 3 312 | } 313 | ], 314 | "is_notice": false, 315 | "unreceived_notice": false, 316 | "cd_hot_value": 100, 317 | "flag_type": 2, 318 | "online": true 319 | } 320 | ] 321 | } 322 | } --------------------------------------------------------------------------------