vulnhub靶场记录DC-4
vulnhub靶场DC-4通关记录靶场描述DC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.
Unlike the previous DC releases, this one is designed primarily for beginners/intermediates. There is only one flag, but technically, multiple entry points and just like last time, no clues.
Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.
For beginners, Google can be of gr ...
vulnhub靶场记录DC-3
vulnhub靶场DC-3通关wp靶场描述DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.
As with the previous DC releases, this one is designed with beginners in mind, although this time around, there is only one flag, one entry point and no clues at all.
Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.
For beginners, Google can be of great assistance, but you ...
vulnhub靶场记录DC-2
vulnhub靶场记录DC-2靶场描述Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
As with the original DC-1, it's designed with beginners in mind.
Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.
Just like with DC-1, there are five flags including the final flag.
And again, just like with DC-1, the flags are important for beginners, bu ...
vulnhub靶场记录DC-1
vulnhub靶场记录DC-1靶机描述DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn.
To successfully complete this challenge, you will require Linux skills, familiarity with the Linux command line and experience with basic penetration testing tools, such as the tools that can be found on Kali Linux, or Pa ...
2022年美亚杯团体赛
2022年美亚杯团体赛AGC计算机31.[单选题] 分析AGC-CS计算机 (Computer) 里最初的作業系統 (Windows) ,它的实際安装时间是什么? (以时区UTC+8回答) (3分)
A. 2022-09-26 14:35:17
B. 2022-09-26 21:35:17
C. 2022-09-27 05:35:17
D. 2022-10-05 03:52:15
E. 2022-10-05 11:52:15
D
32[单选题] AGC-CS计算机里的 ‘Acrobat DC’ 软件的安装时间是? (以时区UTC+8回答) (如答案为 2022-12-29 16:01:59,需回答 20221229160159) (1分)
A. 2022-09-28 19:01:40
B. 2022-09-28 07:18:33
C. 2022-08-30 19:01:40
D. 2022-08-30 07:18:33
A
火眼只能分析出第二个安装时间 但是不是选项 取证大师能分析出两个 选和选项差不多的第一个时间
33[单选题]AGC-CS计算机里的用户 'Car ...
2023龙信杯取证复现
2023龙信杯取证比赛wp移动终端取证1.请分析涉案手机的设备标识是_______。(标准格式:12345678)
85069625
2.请确认嫌疑人首次安装目标APP的安装时间是______。(标准格式:2023-09-13.11:32:23)从聊天记录中获得软件名称
再从应用列表中找到相应应用安装时间
2022-11-16.19:11:26
3.此检材共连接过______个WiFi。(标准格式:1)
6
4.嫌疑人手机短信记录中未读的短信共有______条。(标准格式:12)已读未读软件上是真看不出来 这里学到了 直接查看手机镜像文件的数据库
\data\com.android.providers.telephony\databases\mmssms.db
找到之后 用navicat打开数据库文件
找到sms 里面read列数值为0的 就是未读的短信 按照升序排列 可以找到17个未读短信
17
5.嫌疑人检材手机在浏览器中下载海报背景图的网址是_______。(标准格式:http://www.baidu.com/admin/index.html)
http://m. ...
香山杯-喵帕斯
香山杯 喵帕斯感谢明琦和yolo师傅
签到base64+凯撒
flag{we1c0m3_2_Ctf}
list题目附件
import os
import gmpy2
from Crypto.Util.number import *
import random
from secrets import flag
def pad(s,l):
return s + os.urandom(l - len(s))
def gen():
g = getPrime(8)
while True:
p = g * random.getrandbits(138) + 1
if isPrime(p):
break
while True:
q = g * random.getrandbits(138) + 1
if isPrime(q):
break
N = p ** 5 * q
phi = p ** 4 * (p - 1) * (q - 1)
...
2023蓝帽杯初赛取证wp
2023年蓝帽杯初赛取证wp手机06.该镜像是用的什么模拟器?[答题格式:天天模拟器]一眼雷电
雷电模拟器
07.该镜像中用的聊天软件名称是什么?[答题格式:微信]将三个vmdk文件拖进火眼进行分析 找到一个聊天软件
与你
08.聊天软件的包名是?[答题格式:com.baidu.ces]直接搜hhh
com.uneed.yuni
09.投资理财产品中,受害人最后投资的产品最低要求投资多少钱?[答题格式:1万]
5万
10.受害人是经过谁介绍认识王哥?[答题格式:董慧]
华哥
计算机11.请给出计算机镜像pc.e01的SHA-1值?[答案格式:字母小写]
ea9dcc3d43df4c6448bb56e7ac820619d66fe821
12.给出pc.e01在提取时候的检查员?[答案格式:admin]
pgs
13.请给出嫌疑人计算机内IE浏览器首页地址?[答案格式:http://www.baidu.com]http://global.bing.com/?scope=web&mkt=en-US&FORM=QBRE
14.请给出嫌疑人杨某登录理财网 ...
初识沙箱逃逸
初识沙箱逃逸[HNCTF 2022 Week1]calc_jail_beginner_level(JAIL 沙箱逃逸)给了源码
#Your goal is to read ./flag.txt
#You can use these payload liked `__import__('os').system('cat ./flag.txt')` or `print(open('/flag.txt').read())`
WELCOME = '''
_ ______ _ _ _ _
| | | ____| (_) | | (_) |
| |__ | |__ __ _ _ _ __ _ __ ___ _ __ | | __ _ _| |
| '_ \| __| / _` | | '_ \| '_ \ ...
春苗进阶考核实操
a63ff7cb356c0721c665a93ace5f8e47c80bfdfa7f22e24a80bac4799a8efb58070a4003c7eb2b202482d1c7b5eae5f1c003067a2c9e062d0f54e1925abba89d84ad1d3300f205d588e7ce5fb2cd21fbc3c71a259b6c40e7829bfea27c38d2506447272261bc5104a74b1124b8151de728d73ca2f89204286d4f61190b3446bc1a11c7fba39fa0956116d27876bf797e139555ebd523c3d4eb2c525aa272c859c50e742db00b97a50717347a89f1c8462dcca925a4eae22313905ee37d611c5877f8410d6628c428a3bf5d7b0371bb9d28ee8a6cff79dcab3e29f3e96a697c6cd89d1b0271c2448edce73d2b6dec0ebd913d2ca8ac871bca1 ...