Skip to content

Commit 6c97754

Browse files
committed
tags
1 parent aae4a58 commit 6c97754

File tree

280 files changed

+2561
-766
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

280 files changed

+2561
-766
lines changed

2021-appventure-ctf/pwn/Printwriter 1.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
---
2+
ai_date: '2025-04-27 03:56:03'
3+
ai_summary: Format string attack exploited to gain remote shell by replacing '/bin/ls'
4+
with '/bin/sh'
25
created: 2021-12-21T23:50
6+
tags:
7+
- fmt-str
8+
- rop
9+
- shell
310
updated: 2024-06-10T23:38
411
---
512

@@ -129,4 +136,4 @@ Flag obtained
129136
> cd w
130137
> cat README.txt
131138
> Hello, I was here ;) ZY
132-
> ```
139+
> ```

2021-appventure-ctf/web/AppVenture Login Part 0.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
---
2+
ai_date: '2025-04-27 03:56:06'
3+
ai_summary: Flag found in robots.txt disallowed path pointing to source code containing
4+
the flag
25
created: 2021-12-21T23:50
6+
tags:
7+
- lfi
8+
- src-code
9+
- robots.txt
310
updated: 2024-06-10T23:38
411
---
512

@@ -30,4 +37,4 @@ flag0 = "flag{you_can_use_automated_tools_like_nikto_to_do_this}"
3037
...
3138
```
3239

33-
Flag obtained
40+
Flag obtained

2021-appventure-ctf/web/AppVenture Login Part 1.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
---
2+
ai_date: '2025-04-27 03:56:09'
3+
ai_summary: SQL injection vulnerability due to unescaped user input in a query
24
created: 2021-12-21T23:50
5+
tags:
6+
- sqli
37
updated: 2024-06-10T23:41
48
---
59

@@ -38,4 +42,4 @@ Everything behind `--` is ignored and we successfully log in as admin
3842
flag{you_can_pass_cs6131_now}
3943
```
4044

41-
Flag obtained
45+
Flag obtained

2021-appventure-ctf/web/AppVenture Login Part 2.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,12 @@
11
---
2+
ai_date: '2025-04-27 03:56:12'
3+
ai_summary: Script bruteforces password by checking characters one at a time using
4+
SQL substring.
25
created: 2021-12-21T23:50
6+
tags:
7+
- sql
8+
- brute-force
9+
- substring
310
updated: 2024-06-10T23:38
411
---
512

@@ -81,4 +88,4 @@ flag{oops_looks_like_youre_not_blind}
8188
flag{oops_looks_like_youre_not_blind}
8289
```
8390

84-
Flag obtained
91+
Flag obtained

2021-appventure-ctf/web/Espace 0.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
---
2+
ai_date: '2025-04-27 03:56:17'
3+
ai_summary: Exploited YAML deserialization vulnerability (RCE) in PyYAML 5.3.1 for
4+
remote code execution, using a crafted payload to execute system command and retrieve
5+
flag
26
created: 2021-12-21T23:50
7+
tags:
8+
- remote-code-execution
9+
- pyyaml
10+
- rce
11+
- exploit
12+
- yaml
313
updated: 2024-06-21T21:29
414
---
515

@@ -63,4 +73,4 @@ And after checking webhook.site for the recieved curl request
6373
flag{yet_another_mal-coded_library}
6474
```
6575

66-
Flag obtained
76+
Flag obtained

2021-appventure-ctf/web/Super Secure Trustable Implementation.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,13 @@
11
---
2+
ai_date: '2025-04-27 03:56:21'
3+
ai_summary: Server-side rendering bypassed via template string manipulation and __import__
4+
exploitation to execute system command.
25
created: 2021-12-21T23:50
6+
tags:
7+
- xss
8+
- sqli
9+
- template-string
10+
- exploitation
311
updated: 2024-06-21T21:30
412
---
513

@@ -129,4 +137,4 @@ And after checking webhook.site
129137
flag{server_side_rendering_is_fun_but_dangerous_sometimes}
130138
```
131139

132-
Flag obtained
140+
Flag obtained

2022-CDDC/crypto/PaddingOracle/index.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
---
2+
ai_date: '2025-04-27 03:56:24'
3+
ai_summary: Challenge requires sending a base64-encoded '{flag}' string to the server.
24
created: 2024-06-11T01:17
5+
tags:
6+
- base64
7+
- rfc6462
38
updated: 2024-07-07T23:08
49
---
510

@@ -36,4 +41,4 @@ $ echo '{flag}' | base64
3641
$ nc 18.141.181.118 8573
3742
Please give me base64 string:e2ZsYWd9Cg==
3843
WYhjrL0sqxSFjvdpzshoA+jPAVLqQj4HHywVKCJdNFyNoYHgCyMjwCsw1mTi0Gbc
39-
```
44+
```

2022-CDDC/crypto/Vigenere/index.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
---
2+
ai_date: '2025-04-27 03:56:28'
3+
ai_summary: Vigenere cipher decryption revealed flag
24
created: 2024-06-11T01:17
5+
tags:
6+
- cipher
7+
- decryption
8+
- vigenere
39
updated: 2024-07-07T23:09
410
---
511

@@ -23,4 +29,4 @@ do you know about the vigenere password? if you want to get a flag, you need to
2329

2430
```flag
2531
CDDC22{v3ry_simple_4nd_34sy_crypt0_ch4llenge}
26-
```
32+
```

2022-CDDC/forensics/CopynPaste/index.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,14 @@
11
---
2+
ai_date: '2025-04-27 03:56:33'
3+
ai_summary: 'SVG animation reveals base64-encoded PNG, extracting flag: CDDC22{S4V4G3_LOVE}'
24
created: 2024-06-11T01:17
3-
updated: 2024-07-07T23:08
5+
tags:
6+
- svg
7+
- base64-decode
8+
- flag-extraction
9+
- png
410
title: Copy & Paste
11+
updated: 2024-07-07T23:08
512
---
613

714
The svg is an animation of a terminal window it seems, well a bit of digging and we find this
@@ -43,4 +50,4 @@ It is an PNG image, adding the extension gives us
4350

4451
```flag
4552
CDDC22{S4V4G3_LOVE}
46-
```
53+
```

2022-CDDC/forensics/Salad/index.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,13 @@
11
---
2+
ai_date: '2025-04-27 03:56:37'
3+
ai_summary: Found hidden data in image by converting to QR code and decoding binary
4+
data
25
created: 2024-06-11T01:17
6+
tags:
7+
- bin-repr
8+
- qr
9+
- imgf
10+
- steg
311
updated: 2024-07-07T23:08
412
---
513

@@ -65,4 +73,4 @@ print(''.join([chr(ord(i) - 3) if i != "{" and i != "}" and i != "_" else i for
6573
RkdHRjU1ezhkT2RnOF9EdTZfajMzZ183X2s2ZG93a30=
6674
b'FGGF55{8dOdg8_Du6_j33g_7_k6dowk}'
6775
CDDC22{5aLad5_Ar3_g00d_4_h3alth}
68-
```
76+
```

0 commit comments

Comments
 (0)