Upgrade to Pro — share decks privately, control downloads, hide ads and more …

CTF介绍.pdf

hellok
January 12, 2013
550

 CTF介绍.pdf

hellok

January 12, 2013
Tweet

Transcript

  1. POC

  2. from PIL import Image # Open the image in read

    mode im = Image.open('.png', 'r') # pixels is an object which allows access to # individual pixels pixels = im.load() # Get the size of the picture width, height = im.size binary_ans = '' for y in xrange(height): # Iterate through each pixel for x in xrange(width): #pixels[x, y] returns a tuple with RGB vals red_pix = pixels[x, y][0] green_pix = pixels[x, y][1] blue_pix = pixels[x, y][2] #print pixels[x, y] if red_pix == 255: binary_ans += '1' elif red_pix == 254: binary_ans += '0' if green_pix == 255: binary_ans += '1' elif green_pix == 254: binary_ans += '0' if blue_pix == 255: binary_ans += '1' elif blue_pix == 254: binary_ans += '0' # This just converts the binary to ASCII answer = '' for i in xrange(len(binary_ans)/8): answer += chr(int(binary_ans[i*8:i*8+8], 2)) f=open('answer.txt','w') f.write(answer) f.close() #print answer
  3. 29c3-ctf-exploitation-200-ru1337 • 32位ELF(常常为64位) • $ nc 94.45.252.242 1024 • ID&PASSWORD

    1337NESS EVALUATION • Please enter your username and password • User: aaaaaaaaaaaaaaa • Password: bbbbbbbbbbbbbbbbbbbb • u r not s0 1337zz!!!
  4. net100 • Find the secret link in this conversation •

    strings epicark100.pcap | grep -i key • message=some%20shit%20happend%20%20this%20su nday.%20i%20have%20downloaded • %20this%20(key- http%3A%2F%2Ftinyurl.com%2F9qj5r4r)&to=%23hacku • message=oh%2C%20sry.%20key%20is%20tinyurl.com %2F8pdox5a&to=%23hacku • mPOST /safebrowsing/downloads?client=navclient- autoffox&appver=15.0.1&pver=2.2&wrkey=AKEgNiuG_3 JPr9B41IQNypI7EAVw8oaCQtVJYpdMOG • gLKkFvOQVQtyEW3U9c28TOgCy1vXiYXUF7xQ8ssxtcl OypciYrG9RAdg== HTTP/1.1
  5. net200 • What's the md5 of the file being transferred?

    • 从流中提取文件,计算MD5值 • 各种自定义协议,需要自己解包 复杂