linux 黑曜石浏览器,Hackergame 2018 wp · float’s blog

news/2024/11/29 6:32:09/

66b52468c121889b900d4956032f1009.png

8种机械键盘轴体对比

本人程序员,要买一个写代码的键盘,请问红轴和茶轴怎么选?

emmmmmm这次的Hackgame还是脑洞为主。。。我只做出来了6道题,这里结合官方wp总结一下,题目现在还是可以做的(https://hack2018.lug.ustc.edu.cn/)

签到题

打开页面后得到信息:

b7350f1af0c977c32138e50e9c515487.png

要求提交指定字符串。查看网页源码中表单名称:1

Key:

get上去:1http://202.38.95.46:12002/?key=hackergame2018

得到flag:flag{Hackergame2018_Have_Fun!}

猫咪问答

emmmmmm我不是中科大学生所以没做完这道。。不过也算是一个小社工吧,自己网上检索信息

flag:flag{G00G1E-is-always-YOUR-FRIEND}

游园会的集章卡片

这个题就不细说了。。。主要是给了一堆图片拼图,自行拼就行了

flag:flag{H4PPY_1M4GE_PR0CE551NG}

猫咪和键盘

打开后是一份乱的C++代码,需要还原。可以看出代码按列打乱了。

使用vim编辑器,列编辑模式还原后:1

2

3

4

5

6

7

8

9

10

11

12

13name: typed_printf.cpp

compile: g++ -std=c++17 typed_printf.cpp

title: type safe printf

author: nicekingwei

url: aHR0cHM6Ly96anUtbGFtYmRhLnRlY2gvY3BwZHQtcHJpbnRmLw==

related knowledge:

- value and type

value->value: function

type->value: parametric polymorphism

type->type: generic

value->type: dependent type

- auto

- if constexpr

编译运行后得到flag(待实验…)

Word文档

还真不知道docx文档结构是这样的

拖进winhex里:

6c3b183d400f578bdf2c9e041b3fbf1a.png

可以看出为zip文件,该后缀打开后里面就有flag文本文件了

flag:flag{xlsx,pptx,docx_are_just_zip_files}

猫咪银行

这道题开始以为要在js脚本上做文章,后来发现好像没用。。。然后买1/4的flag也没啥用。

后来存钱时,随便输了个很大的数字,发现结果不对劲,才反应过来是溢出问题。

输入一个大数,且收入不为负,时间在现在时间点前面就行(可以直接取出),多试几个数就可以了。

f3d90ccd84d5b2f0b9b134d62c1d0666.png

flag:flag{Evil_Integer._Evil_Overflow.}

黑曜石浏览器

这道题费了我好几天都没搞出来。。

抓包后是这样的:1

2

3

4

5

6

7

8

9

10GET / HTTP/1.1

Host: 202.38.95.46:12001

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3

Accept-Encoding: gzip, deflate

Cookie: PHPSESSID=2e76eef44e3dd8842a479aa79f7f6396

Connection: keep-alive

Upgrade-Insecure-Requests: 1

Cache-Control: max-age=0

返回提示说要使用最新的黑曜石浏览器(HEICORE),即我们需要知道最新的HEICORE浏览器的版本号,遂百度了一下,没东西。。试了各种手段没结果,于是懵逼了几天

肿么办呢?just google!google HEICORE会看到有一个HEICORE的官网(明显是中科大搭的。。。。)进去后什么都点不了。。下面有个v0.0.2以为是最新版本号,试了也没用。

4%20.png

后来查看了http://heicore.com的代码(不是index.php那个页面!),可以看到下载文件的名称,里面附带的有版本号49.1.2623.213,这才有结果了。。1

2

3

4

5

6

7$("#download_link").click(function(){

if (!window.loggedIn) {

alert("仅差一步!请于登录后下载黑曜石浏览器。");

}

else {

window.location.href="HEICORE.49.1.2623.213_installer_latest.exe";

}

bp改User-Agent后:1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:56.0) Gecko/20100101 HEICORE/49.1.2623.213

返回结果:

f4e9b708ea8c229d4d45dc20acc9e918.png

ps:官槽:除了百度以外的所有搜索引擎几乎都能找到该浏览器的官网:heicore.com

emmmmmmmmmmmmmmmmmmmmmmmmmm以后还是google吧

得到flag:flag{H3ic0re_49.1.2623.213_sai_kou}

回到过去

这道题只要熟悉unix/linux下的ed编辑器命令就好了。

题目也给出来了具体步骤,虚拟机里敲一遍即可。

flag:flag{t4a2b8c44039f93345a3d9b2}

我是谁

第一问:burp刷新了几次截包后,会在返回头里看到teapot,即关键字,得到flag:flag{i_canN0t_BReW_c0ffEE!}

打开链接来到第二问,提示需要换一种请求方式:

74029b08d3c689eec0f8a5aba377ec93.png

我们在burp换为POST形式:

d756500bb2650538b41ae561be3d7e47.png

提示POST也不行,emmmmmmmmmm????当时做到这里就不会了,后面提到的BREW请求也没见过,所以没出来。。。

查看提示的文档

1228d5a6747488a54b3db491db6faebc.png

得知还有BREW这种请求。。。

a801fe76bb2790c958e2a76835c9602b.png

还要带上一个参数Content-Type: message/teapot',返回结果:

![](/img/Hackergame-2018-wp/10.png)

从返回头中看到下一个链接,同样的方式访问:

![](/img/Hackergame-2018-wp/11.png)

得到flag:flag{delivering_tea_to_DaLa0}`

家里有矿

秘籍残篇

猫咪遥控器

下载下来一个文本,内容全部为D、R、L、U的组合,可以联想到up,down,left,right四个方向。即这是是一个图片,可由这个步骤画出。

这里使用HTML中的canvas标签,该标签相当于一个图形容器,可以根据js脚本来绘制相应的图形。(当然pyhton的Turtle也是可以画出来的)下面是脚本:1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

Cat Controller

#path {

border: 1px solid #000000;

}

var seq = "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRDDDDDDDDDDDDDDDDDDDDLLLLLLLLLLLLLLLLLLDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDUUUUUUUUUUUUUUUUUUUUUUUUUULLLLLLLLLLLLRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRLLLLLLLLLLLLLLLLLLLLLLLLRRRRDDDDDDDDRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRUUUUUUUUUUUUUUUUUUUUDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDUUUUUUUUUUUUUUUUUUUURRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRUUUUUUUULLLLLLLLLLLLLLLLRRRRRRRRRRRRRRRRRRRRLLLLDDDDDDDDDDDDDDDDDDDDDDDDDDDDLLLLLLLLLLLLLLLLLLLLUUUUUUUUUUUUUUUURRRRRRRRRRRRRRRRRRRRUUUUUUUUUUUULLLLLLLLLLLLLLLLLLLLRRRRRRRRRRRRRRRRRRRRRRRRLLLLDDDDDDDDRRRRRRRRRRRRRRRRDDDDDDDDDDDDDDDDDDDDRRRRRRRRRRRRRRRRRRRRUUUUUUUUUUUUUUUUUUUUUUUUUUUULLLLLLLLLLLLLLLLLLLLDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDUUUURRRRRRRRRRRRRRRRRRRRRRRRLLLLDDDDDDDDDDDDLLLLLLLLLLLLLLLLLLLLLLLLRRRRRRRRRRRRRRRRRRRRRRRRRRRRLLLLUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUDDDDDDDDRRRRRRRRRRRRRRRRRRRRRRRRRRRRUUUUUUUUUUUUUUUUUUUURRRRRRRRLLLLLLLLDDDDDDDDDDDDDDDDDDDDDDDDLLLLLLLLDDDDRRRRRRRRDDDDDDDDDDDDDDDDDDDDDDDDRRRRRRRRLLLLLLLLUUUUUUUUUUUUUUUUUUUUUUUULLLLLLLLUUUURRRRRRRRUUUURRRRRRRRRRRRRRRRRRRRRRRRDDDDDDDDDDDDDDDDDDDDUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUURRRRDDDDRRRRDDDDRRRRDDDDDDDDDDDDDDDDUUUUUUUUUUUUUUUURRRRRRRRUUUUUUUURRRRDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDUUUUUUUUUUUUUUUUUUUURRRRRRRRRRRRUUUURRRRUUUURRRRRRRRRRRRRRRRDDDDRRRRDDDDRRRRDDDDDDDDLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLUUUURRRRUUUUDDDDLLLLDDDDDDDDRRRRDDDDRRRRDDDDRRRRRRRRRRRRUUUURRRRRRRRUUUUDDDDLLLLLLLLDDDDLLLLLLLLLLLLUUUULLLLUUUULLLLUUUUUUUURRRRUUUURRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRDDDDDDDDDDDDDDDDDRRRRRRRRRRRRRRRRRRRRRRRRRRRRUUUUUUUUUUUUUUUUUUUUUUUULLLLLLLLLLLLLLLLLLLLLLLLLLLLDDDDDDDDDDDDDDDDDDDDDDDDRRRRRRRRRRRRRRRRRRRRRRRRRRRRUUUUUUUUUUUUUUUURRRRRRRRUUUULLLLUUUUDDDDRRRRDDDDRRRRDDDDDDDDDDDDDDDDDDDDRRRRUUUUUUUUUUUURRRRUUUUUUUUDDDDDDDDRRRRDDDDDDDDDDDDRRRRUUUUUUUUUUUUUUUUUUUURRRRUUUURRRRUUUUDDDDLLLLDDDDRRRRRRRRRRRRUUUUUUUUUUUUUUUUDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUURRRRDDDDRRRRDDDDRRRRDDDDDDDDDDDDDDDDUUUUUUUUUUUUUUUURRRRUUUURRRRUUUURRRRDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDUUUUUUUUUUUUUUUUUUUUDDDDUUUURRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRLLLLLLLLLLLLLLLLUUUULLLLUUUULLLLLLLLDDDDLLLLDDDDLLLLDDDDDDDDDDDDRRRRDDDDRRRRDDDDRRRRRRRRUUUURRRRRRRRUUUUDDDDLLLLLLLLDDDDLLLLLLLLUUUULLLLUUUULLLLUUUUUUUURRRRRRRRRRRRRRRRRRRRRRRRUUUULLLLUUUUDDDDRRRRRRRRRRRRRRRRRRRRDDDDDDDDDDDDDDDDRRRRRRRRRRRRRRRRRRRRUUUUUUUUUUUUUUUUUUUULLLLLLLLLLLLLLLLLLLLDDDDDDDDUUUUUUUURRRRRRRRRRRRRRRRRRRRDDDDRRRRRRRRRRRRUUUULLLLUUUUDDDDRRRRDDDDRRRRDDDDDDDDDDDDDDDDDDDDRRRRUUUUUUUUUUUUUUUURRRRUUUUUUUUDDDDDDDDRRRRDDDDDDDDDDDDDDDDRRRRRRRRUUUUUUUUUUUUUUUURRRRUUUUUUUURRRRUUUUDDDDLLLLDDDDRRRRRRRRRRRRRRRRRRRRUUUUUUUUUUUUUUUULLLLLLLLRRRRRRRRDDDDDDDDDDDDDDDDDDDDRRRRRRRRDDDDLLLLLLLLDDDDDDDDDDDDDDDDDDDDLLLLLLLL";

var ctx = document.getElementById('path').getContext('2d');

var x = 0, y = 0;

function (type){

switch (type) {

case 'U': y -= 1; break;

case 'D': y += 1; break;

case 'L': x -= 1; break;

case 'R': x += 1; break;

}

ctx.fillRect(x, y, 1, 1);

}

for (var i = 0; i < seq.length; i++) {

move(seq[i]);

}

//

打开即可得到flag:flag{MeowMeow}

bedae12f55e72ed3d50bfe805f5882d2.png

她的诗

下载附件,为一个文本和一个py文件。1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16#!/usr/bin/env python3

# This script helps you decode "her poem"

from codecs import decode

fin = open("poem.txt", "r")

fout = open("poem.out", "w")

for i in fin:

data = "begin 666 n" + i + " nendn"

decode_data = decode(data.encode("ascii"), "uu")

print(decode_data)

fout.write(decode_data.decode("ascii") + "n")

fin.close()

fout.close()

跑后将poem文本文件解析为了明文,但是文件中没有flag,说明有猫腻。。。

注意到py脚本中有一行begin 666,百度后:

c090eeeccc7fe154fe7fc916017f3b9c.png

得知加密方式为uuencode,在线解密后得结果:1---------There is something in this worldfthat no one has ever seen before.It is gentle and sweet.lMaybe if it could be seen,aeveryone would fight over it.gThat is why the world hid it,{so that no one could get their handson it so easily.STHowever, someday, someone will find it.The person who deserves it the mostewill definitely find it.---------Do you like this school?I really, really love it.gABut nothing can stay unchanged.n0Fun things... Happy things...gThey can't all possibly stay unchanged.Even so,rcan you go on loving this place?A---------Sometimes I wonder,Phwhat if this town was alive?y_What if it had thoughts and feelingslike one of us?If it did,w1I think it would want to make the peopletHwho live here happy._---------Expectations are what you havewhen you have given up.uExpectations are born fromUa despairingly large difference in skill.e---------A joke only lasts for a moment,Ncif it leaves a misunderstanding,0it becomes a lie.D---------If someone didn't have any pride,wouldn't they also be lackingEin self-confidence?_IIf someone was free of greed,5wouldn't they have trouble_supporting their family?And if people didn't envy one another,5wouldn't they stop inventing new things?0_---------If I don't have to do it, I won't.fuIf I have to do it, I'll make it.---------/* Here is the end of my poem.

可以看出与脚本解出来的是有区别的,部分单词多出了几个字母,组合(最后补上显而易见的字符。。。)即可得到flag:flag{sSTegAn0grAPhy_w1tH_uUeNc0DE_I5_50_fun}

猫咪克星

这道题属于一道基础题,即使用py脚本进行简单的网络编程。

题目提示:nc 202.38.95.47 12009

先cmd试验一下:

14.png

要求:快速运算一个算术式并在30s内返回结果

打开IDE直接输入式子,并将结果写进cmd发送,你会发现你源源不断的得到新的式子,这样的话手工运算30s内是肯定算不完的。

14.png

这是我们想到了python的eval函数—-执行一个算数表达式。

下面是eval函数的解释:1

2

3

4

5

6

7

8

9

10Help on built-in function eval in module builtins:

eval(source, globals=None, locals=None, /)

Evaluate the given source in the context of globals and locals.

The source may be a string representing a Python expression

or a code object as returned by compile().

The globals must be a dictionary and locals can be any mapping,

defaulting to the current globals and locals.

If only globals is given, locals defaults to it.

如下脚本:1

2


http://www.ppmy.cn/news/483336.html

相关文章

IBM x3750 M4之IMM管理

IBM x3750 M4之IMM管理 现有IBM System x3750 M4(8722A1C)配置 产品类别 机架式 产品结构 2U CPU类型 Intel 至强E5-4600 CPU型号 Xeon E5-4640 CPU频率 2.4GHz CPU数量 4颗 制程工艺 32nm 三级缓存 20MB CPU核心 1x8核 CPU线程数 1X16线程 扩展槽 5PCI-…

服务器开机电源黄灯 无显示,IBM服务器无法启动,服务器型号X3300m4. 面板有个方形黄灯亮起,如下图...

满意答案 IBM服务器,!黄灯亮解决方法 系统故障: 机器的前面板!灯亮起来。有的情况下系统可以正常运行,但是有的情况下系统运行故障。 解决方法: 1、重新启动服务器,按F1进入Configuration/Setup Utility; 2、查看Error Logs选项下的黄色感叹号开始亮起来的日期以后的错误…

联想如何打开计算机配置,联想电脑 怎么进入bios设置(5页)-原创力文档

联 想 电脑 怎 么 进 入 b i o s 设 置 以 前 早 些 时 候 进 入 bi os 很 简 单 &#xff0c; 现 在 比 较 错 综 复 杂 &#xff0c; 其 实 进 入 的 方 式 都 是 一 样 &#xff0c; 不 外 乎 那 几 个 键 &#xff0c; 但 是 目前 不 同 的 机 型 进 BI OS 的 按 键 也 不 …

ibm x3250 m4 安装linux,IBM system X3250 M4 配置RAID磁盘阵列的方法

最近接手两台IBM system X3250 M4的机器。 一台用两块SAS硬盘组成RAID1.安装Windows server 2008. 一台用四块SAS硬盘组成RAID10.安装RHEL5.8 注意&#xff1a; system X3250 M4配置了RAID后用Server Guide v9.22是无法安装windows server 2003的。只支持windows server 2008.不…

玩转系统|完美替代ChatGPT!Claude注册教程及出现问题解决方案

目录 1、什么是ChatGPT&#xff1f; 2、什么是Claude&#xff1f; 3、为什么推荐Claude? 3.1、Claude特性 4、注册 slack 5、Claude添加到Slack 6、出现APP Unavailable问题 7、如何解决该问题 8、使用感受 8、1代码测试 8、2文学测试 8、3英语测试 1、什么是ChatGPT&a…

【QQ界面展示-监听键盘事件 Objective-C语言】

一、关于这个通知,我们就说到这里, 1.接下来,就看一下, 我们说了这么一堆,目的是为了什么, 目的是为了监听我们那个键盘的点击事件吧, 我们说了一堆,目的是为了监听我们这个键盘的弹出事件、不是点击事件, 当键盘弹出以后,我们是不是要做一件事儿, 那么,我们知道…

COMSOL导入图片几何模型-以二维多孔介质为例

建模教程 首先获取一张多孔介质图片&#xff0c;这里就以COMSOL官网教程图片为例 通过软件将png格式的图片转换为DXF格式文件&#xff0c;也就是AutoCAD支持的文件&#xff1a; 下一步打开COMSOL软件建立二维模型&#xff0c;导入事先准备好的dxf模型&#xff0c;需要注意导入…

COMSOL微观多孔介质二维渗流模拟基于四参数随机生长建模

微观多孔介质流体 微观多孔介质广泛存在于岩石、土层等流体介质之中&#xff0c;这使得流体穿过存在复杂性&#xff0c;渗流的微观结构决定其宏观现象&#xff0c;在研究中可采用表征单元体&#xff08;representative elementary volume&#xff0c;简称REV&#xff09;方法&…