16,048 users solved
Author: thelshell
Description
Best Stuff - Cheap Stuff, Buy Buy Buy... Store Instance: source. The shop is open for business at .nc mercury.picoctf.net 10337
2025年8月17日小于 1 分钟
16,048 users solved
Author: thelshell
Best Stuff - Cheap Stuff, Buy Buy Buy... Store Instance: source. The shop is open for business at .nc mercury.picoctf.net 10337
开启虚拟机,NAT,扫描对应C段,发现主机
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-15 22:58 CST
Nmap scan report for 192.168.254.1
Host is up (0.00038s latency).
Nmap scan report for 192.168.254.145
Host is up (0.00046s latency).
Nmap done: 256 IP addresses (2 hosts up) scanned in 16.88 seconds
这题和上题差不多,简单分析逻辑即可
int __fastcall main(int argc, const char **argv, const char **envp)
{
int stat_loc; // [rsp+4h] [rbp-3Ch] BYREF
int i; // [rsp+8h] [rbp-38h]
__pid_t pid; // [rsp+Ch] [rbp-34h]
char s2[24]; // [rsp+10h] [rbp-30h] BYREF
unsigned __int64 v8; // [rsp+28h] [rbp-18h]
v8 = __readfsqword(0x28u);
pid = fork();
if ( pid )
{
waitpid(pid, &stat_loc, 0);
}
else
{
for ( i = 0; i <= strlen(flag); ++i )
{
if ( flag[i] == 105 || flag[i] == 114 )
flag[i] = 49;
}
}
printf("input the flag:");
__isoc99_scanf("%20s", s2);
if ( !strcmp(flag, s2) )
return puts("this is the right flag!");
else
return puts("wrong flag!");
}
先打开IDA,然后找到main函数,直接分析逻辑即可,发现会与{hell0_w0rld}
进行比较,所以
flag是
flag{hell0_w0rld}
以下假期应该进行的非量化任务,基础打牢,不求量多,但求吃透。
刷靶场,贪多不消化,力求做到渗透流程化、规范化,并且提供更多的渗透思路
可以和THM靶场换着来
知识库分类整理,做到知识随用随取
先学应用操作题,顺便把理论题快速刷,最后再把模拟真题刷
可以尝试一下结合现有工具完成流程化信息收集等基础部分
主机发现192.168.254.144
端口扫描
┌──(root㉿localhost)-[~]
└─# nmap -sT --min-rate 10000 192.168.254.144
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-17 02:26 CST
Nmap scan report for 192.168.254.144
Host is up (0.0011s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 0.20 seconds
可恶的virtualbox靶场,让我踩了一堆坑
┌──(kali㉿kali)-[~]
└─$ sudo nmap -sT --min-rate 10000 -p- 192.168.56.102 -oA nmapscan/ports
[sudo] password for kali:
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-13 13:34 EDT
Nmap scan report for 192.168.56.102
Host is up (0.025s latency).
Not shown: 65530 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
110/tcp open pop3
3306/tcp open mysql
8080/tcp open http-proxy
Nmap done: 1 IP address (1 host up) scanned in 18.85 seconds
扫描192.168.254.0/24网段
扫描192.168.254.142主机
┌──(root㉿localhost)-[/home]
└─# nmap -sT --min-rate 10000 192.168.254.142 -oA nmapscan/w1r3s-port
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-11 22:08 CST
Nmap scan report for 192.168.254.142
Host is up (0.00035s latency).
Not shown: 966 filtered tcp ports (no-response), 30 closed tcp ports (conn-refused)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
3306/tcp open mysql
Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds