amyy45/CTF-Writeups

GitHub: amyy45/CTF-Writeups

Stars: 0 | Forks: 0

# 🚩 CTF Writeups 这是一个CTF(Capture The Flag,夺旗赛)挑战题解的个人合集,记录了我在各种网络安全竞赛和平臺上的旅程。每篇题解都涵盖了思路、使用的工具以及详细的解题步骤。 ## 👩‍💻 作者 **Sneha** —— 一名网络安全爱好者,记录涉及 Web Exploitation、Forensics、Reverse Engineering、Cryptography 等领域的解题过程。 ## 📁 仓库结构 ``` CTF-Writeups/ ├── CTFs/ │ ├── Binary Exploitation/ │ ├── Cryptography/ │ ├── Forensics/ │ ├── General/ │ ├── Reverse Engineering/ │ ├── Web Exploitation/ ├── HackTheBox/ ├── TryHackMe/ └── Misc/ ``` ## 📚 题解索引 ### 🌐 Web Exploitation | 题目名称 | 平台 | 难度 | 关键技术 | |-----------|----------|------------|---------------| | [GET aHEAD](CTFs/Web%20Exploitation/get_aHead.md) | picoCTF 2021 | Easy | HTTP HEAD method | | [dont-use-client-side](CTFs/Web%20Exploitation/dont_use_client_side.md) | picoCTF 2019 | Easy | Client-side JS analysis | | [logon](CTFs/Web%20Exploitation/logon.md) | picoCTF 2019 | Easy | Cookie manipulation | | [Crack the Gate 2](CTFs/Web%20Exploitation/crack_the_gate2.md) | picoMini CMU-Africa | Medium | XFF header bypass + brute force | | [Bookmarklet](CTFs/Web%20Exploitation/Bookmarklet.md) | picoCTF | Easy | JavaScript bookmarklet | | [Cookies](CTFs/Web%20Exploitation/Cookies.md) | picoCTF | Easy | Cookie manipulation | | [Includes](CTFs/Web%20Exploitation/Includes.md) | picoCTF | Easy | File inclusion | | [Inspect HTML](CTFs/Web%20Exploitation/InspectHTML.md) | picoCTF | Easy | HTML inspection | | [Intro to Burp](CTFs/Web%20Exploitation/IntoToBurp.md) | picoCTF | Easy | Burp Suite | | [Local Authority](CTFs/Web%20Exploitation/LocalAuthority.md) | picoCTF | Easy | Client-side auth | | [SSTI 1](CTFs/Web%20Exploitation/SSTI1.md) | picoCTF | Easy | Server-side template injection | | [Scavenger Hunt](CTFs/Web%20Exploitation/ScavengerHunt.md) | picoCTF 2021 | Easy | Hidden web resources | | [Unminify](CTFs/Web%20Exploitation/Unminify.md) | picoCTF | Easy | JS deobfuscation | | [Cookie Monster](CTFs/Web%20Exploitation/cookie_monster.md) | picoCTF | Easy | Cookie manipulation | | [Crack the Gate 1](CTFs/Web%20Exploitation/crack_the_gate1.md) | picoMini CMU-Africa | Easy | Brute force | | [Web Decode](CTFs/Web%20Exploitation/webDecode.md) | picoCTF | Easy | Encoding | ### 🔬 Forensics | 题目名称 | 平台 | 难度 | 关键技术 | |-----------|----------|------------|---------------| | [Riddle Registry](CTFs/Forensics/riddleRegistry.md) | picoMini CMU-Africa | Easy | PDF metadata + Base64 | | [Hidden in Plainsight](CTFs/Forensics/hiddenInPlaintext.md) | picoMini CMU-Africa | Easy | Image metadata + steghide | | [RED](CTFs/Forensics/red.md) | picoCTF 2025 | Easy | RGBA channel LSB + Base64 | | [Ph4nt0m 1ntrud3r](CTFs/Forensics/panthom_intruder.md) | picoCTF 2025 | Easy | PCAP analysis + timestamp ordering | | [Disko 1](CTFs/Forensics/Disko1.md) | picoCTF | Easy | Disk forensics | | [Corrupted File](CTFs/Forensics/corruptedFile.md) | picoCTF | Easy | File repair | ### 🔄 Reverse Engineering | 题目名称 | 平台 | 难度 | 关键技术 | |-----------|----------|------------|---------------| | [Flag Hunters](CTFs/Reverse%20Engineering/flagHunter.md) | picoCTF 2025 | Easy | Delimiter injection | | [Transformation](CTFs/Reverse%20Engineering/transformation.md) | picoCTF 2021 | Easy | Bit manipulation / Unicode encoding | ### 🔐 Cryptography | 题目名称 | 平台 | 难度 | 关键技术 | |-----------|----------|------------|---------------| | [13](CTFs/Cryptography/13.md) | picoCTF | Easy | ROT13 | | [RSA](CTFs/Cryptography/RSA.md) | picoCTF | Easy | RSA decryption | | [Crack the Power](CTFs/Cryptography/crackThePower.md) | picoCTF | Easy | Weak exponent | | [Hash Crack](CTFs/Cryptography/hashcrack.md) | picoCTF | Easy | Hash cracking | | [interencdec](CTFs/Cryptography/interencdec.md) | picoCTF | Easy | Layered encoding | | [The Numbers](CTFs/Cryptography/theNumbers.md) | picoCTF | Easy | Number-to-letter substitution | ### ⚙️ General | 题目名称 | 平台 | 难度 | 关键技术 | |-----------|----------|------------|---------------| | [Log Hunt](CTFs/General/Log-hunt.md) | picoCTF | Easy | Log file analysis | ### 🎮 Misc | 题目名称 | 平台 | 难度 | 关键技术 | |-----------|----------|------------|---------------| | [Fantasy CTF](Misc/fantasy-ctf.md) | Misc | Easy | Misc | ## 🛠️ 使用工具 | 工具 | 用途 | |------|---------| | `curl` | HTTP request manipulation | | `exiftool` | File metadata extraction | | `steghide` | Image steganography extraction | | `zsteg` | PNG steganography analysis | | `tshark` / `dpkt` | PCAP network analysis | | `binwalk` | Binary file analysis | | `strings` | Extract readable strings from files | | `base64` | Encoding/decoding | | `Python (PIL/Pillow)` | Image pixel analysis | | Browser DevTools | JS/cookie inspection | | `Burp Suite` | Web traffic interception | ## 🧠 涵盖的核心概念 - HTTP methods (GET, POST, HEAD) - Cookie and session manipulation - Client-side authentication bypass - SQL injection & authentication bypass - IP spoofing via `X-Forwarded-For` header - Password brute forcing - PDF/image metadata analysis - Steganography (steghide, LSB, RGBA channels) - PCAP forensics and timestamp analysis - Bit manipulation and Unicode encoding - Base64 / ROT13 / RSA decryption - Delimiter injection in interpreted programs ## 📝 题解格式 每篇题解遵循一致的格式: 1. **题目描述 (Challenge Description)** —— 题目说明 2. **初步想法 / 思路 (Initial Thoughts / Approach)** —— 我的切入点 3. **解题步骤 (Steps to Solve)** —— 详细的分步演示 4. **最终 Flag (Final Flag)** —— 获取到的 flag 5. **关键收获 (Key Learnings)** —— 题目教会了我什么 6. **下次改进 (Improvements for Next Time)** —— 如何更快解决 7. **参考资料 (References)** —— 有用的链接和文档 ## 🚀 平台 - [picoCTF](https://picoctf.org) —— 由卡内基梅隆大学 (Carnegie Mellon University) 主办的适合初学者的 CTF - [HackTheBox](https://hackthebox.com) —— 中级/高级靶机和挑战 - [TryHackMe](https://tryhackme.com) —— 引导式学习路径和房间 ## ⚠️ 免责声明 所有题解仅供**教育目的**。题目均来自合法的 CTF 平台,在这些平台上解题和分享解法是被允许且受到鼓励的。 ⭐ *如果您觉得这些题解有帮助,欢迎给仓库点个 Star!*
标签:Burp Suite, CISA项目, Cookie欺骗, CTF题解, HackTheBox, HTTP请求方法, meg, picoCTF, SSTI, TryHackMe, Web安全, Web开发安全, Writeup, XFF绕过, 二进制利用, 云资产清单, 信息安全, 域环境安全, 密码学, 手动系统调用, 技术文档, 插件系统, 文件包含, 漏洞分析, 网络安全, 网络安全审计, 蓝队分析, 解题思路, 路径探测, 逆向工具, 逆向工程, 隐私保护