mirror of
https://github.com/nganhkhoa/CTF-All-In-One.git
synced 2025-06-23 11:45:04 +07:00
fix
This commit is contained in:
@ -1,10 +1,21 @@
|
||||
# 2.3.2 OllyDbg 调试器
|
||||
|
||||
- [快捷键](#快捷键)
|
||||
- [命令行插件](#命令行插件)
|
||||
- [参考资料](#参考资料)
|
||||
|
||||
|
||||
## 快捷键
|
||||
- F2:在光标选定位置按 F2 键设置或取消断点。
|
||||
- F4:运行到光标选定位置处暂停。
|
||||
- F7:单步步入:每次执行一条指令,遇到 call 等子程序时进入其中。
|
||||
- F8:单步步过,每次执行一条指令,遇到 call 等子程序时不进入其中。
|
||||
- F9:运行,被调试软件继续运行,直到遇到下一个断点。
|
||||
- Ctrl+F9:执行到返回,在执行到一个 ret 指令时暂停,常用于从当前函数快速返回到上一个函数。
|
||||
- Alt+F9:执行到用户代码,可用于从系统部分快速返回到被调试程序部分。
|
||||
|
||||
|
||||
## 命令行插件
|
||||
|
||||
## 参考资料
|
||||
- http://www.ollydbg.de/
|
||||
|
13
doc/2.4.7_cuckoo.md
Normal file
13
doc/2.4.7_cuckoo.md
Normal file
@ -0,0 +1,13 @@
|
||||
# 2.4.7 Cuckoo Sandbox
|
||||
|
||||
- [简介](#简介)
|
||||
- [安装](#安装)
|
||||
- [参考资料](#参考资料)
|
||||
|
||||
|
||||
## 简介
|
||||
|
||||
## 安装
|
||||
|
||||
## 参考资料
|
||||
- https://cuckoosandbox.org/
|
@ -24,3 +24,4 @@
|
||||
* [2.4.4 binwalk](2.4.4_binwalk.md)
|
||||
* [2.4.5 Burp Suite](2.4.5_burpsuite.md)
|
||||
* [2.4.6 Wireshark](2.4.6_wireshark.md)
|
||||
* [2.4.7 Cuckoo Sandbox](2.4.7_cuckoo.md)
|
||||
|
@ -23,7 +23,6 @@
|
||||
```
|
||||
$ git clone https://github.com/Z3Prover/z3.git
|
||||
$ cd z3
|
||||
|
||||
$ python scripts/mk_make.py --python
|
||||
$ cd build
|
||||
$ make
|
||||
|
@ -2,5 +2,7 @@
|
||||
|
||||
- [参考资料](#参考资料)
|
||||
|
||||
|
||||
## 参考资料
|
||||
- [Quick introduction into SAT/SMT solvers and symbolic execution](https://yurichev.com/writings/SAT_SMT_draft-EN.pdf)
|
||||
- [Practical Symbolic Execution and SATisfiability Module Theories (SMT) 101](http://deniable.org/reversing/symbolic-execution)
|
||||
|
@ -1,10 +1,10 @@
|
||||
# 6.2.3 re Codegate2017 angrybird
|
||||
# 6.2.3 re CodegateCTF2017 angrybird
|
||||
|
||||
- [题目解析](#题目解析)
|
||||
- [参考资料](#参考资料)
|
||||
|
||||
|
||||
[下载文件](../src/writeup/6.2.3_re_codegate2017_angrybird)
|
||||
[下载文件](../src/writeup/6.2.3_re_codegatectf2017_angrybird)
|
||||
|
||||
## 题目解析
|
||||
看题目就知道,这是一个会让我们抓狂的程序,事实也确实如此。
|
||||
@ -266,3 +266,4 @@ you typed : Im_so_cute&pretty_:)
|
||||
|
||||
|
||||
## 参考资料
|
||||
- https://ctftime.org/task/3375
|
@ -1,10 +1,10 @@
|
||||
# 6.2.6 re SECCON2017 printf_machine
|
||||
# 6.2.6 re SECCONCTF2017 printf_machine
|
||||
|
||||
- [题目解析](#题目解析)
|
||||
- [参考资料](#参考资料)
|
||||
|
||||
|
||||
[下载文件](../src/writeup/6.2.6_re_seccon2017_printf_machine)
|
||||
[下载文件](../src/writeup/6.2.6_re_secconctf2017_printf_machine)
|
||||
|
||||
## 题目解析
|
||||
```
|
||||
@ -14,4 +14,5 @@ fsmachine: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically l
|
||||
|
||||
|
||||
## 参考资料
|
||||
- https://ctftime.org/task/5042
|
||||
- [400_printf_machine](https://github.com/SECCON/SECCON2017_online_CTF/tree/master/binary/400_printf_machine)
|
17
doc/6.2.7_re_codegatectf2018_redvelvet.md
Normal file
17
doc/6.2.7_re_codegatectf2018_redvelvet.md
Normal file
@ -0,0 +1,17 @@
|
||||
# 6.2.7 re CodegateCTF2018 RedVelvet
|
||||
|
||||
- [题目解析](#题目解析)
|
||||
- [参考资料](#参考资料)
|
||||
|
||||
|
||||
[下载文件](../src/writeup/6.2.7_re_codegatectf2018_redvelvet)
|
||||
|
||||
## 题目解析
|
||||
```
|
||||
$ file RedVelvet
|
||||
RedVelvet: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=84e7ef91c33878cf9eefc00a7a450895aa573494, not stripped
|
||||
```
|
||||
|
||||
|
||||
## 参考资料
|
||||
- https://ctftime.org/task/5231
|
@ -4,6 +4,8 @@
|
||||
- [解题流程](#解题流程)
|
||||
|
||||
|
||||
[下载文件](../src/writeup/6.3.1_web_hctf2017_babycrack)
|
||||
|
||||
## 题目解析
|
||||
题目就不用多说了,很容易发现是 JavaScript 代码审计。
|
||||
|
||||
|
@ -32,10 +32,11 @@
|
||||
* Reverse
|
||||
* [6.2.1 re XHPCTF2017 dont_panic](6.2.1_re_xhpctf2017_dont_panic.md)
|
||||
* [6.2.2 re ECTF2016 tayy](6.2.2_re_ectf2016_tayy.md)
|
||||
* [6.2.3 re Codegate2017 angrybird](6.2.3_re_codegate2017_angrybird.md)
|
||||
* [6.2.3 re CodegateCTF2017 angrybird](6.2.3_re_codegatectf2017_angrybird.md)
|
||||
* [6.2.4 re CSAWCTF2015 wyvern](6.2.4_re_csawctf2015_wyvern.md)
|
||||
* [6.2.5 re PicoCTF2014 Baleful](6.2.5_re_picoctf2014_baleful.md)
|
||||
* [6.2.6 re SECCON2017 printf_machine](6.2.6_re_seccon2017_printf_machine.md)
|
||||
* [6.2.6 re SECCONCTF2017 printf_machine](6.2.6_re_secconctf2017_printf_machine.md)
|
||||
* [6.2.7 re CodegateCTF2018 RedVelvet](6.2.7_re_codegatectf2018_redvelvet.md)
|
||||
* Web
|
||||
* [6.3.1 web HCTF2017 babycrack](6.3.1_web_hctf2017_babycrack.md)
|
||||
* Crypto
|
||||
|
@ -17,6 +17,7 @@ Adobe Reader 和 Acrobat 9.4 之前版本的 CoolType.dll 中存在基于栈的
|
||||
| --- | --- | --- |
|
||||
| 操作系统 | Windows XP SP3 | 体系结构:32 位 |
|
||||
| 调试器 | OllyDbg | 版本号:吾爱专版 |
|
||||
| 反汇编器 | IDA Pro | 版本号:6.8 |
|
||||
| 漏洞软件 | Adobe Reader | 版本号:9.3.4 |
|
||||
|
||||
我们利用 Metasploit 来生成攻击样本:
|
||||
|
@ -1,18 +0,0 @@
|
||||
# 7.1.9 CVE-2010-2333 Microsoft Word RTF pFragments 栈溢出漏洞
|
||||
|
||||
- [漏洞描述](#漏洞描述)
|
||||
- [漏洞复现](#漏洞复现)
|
||||
- [漏洞分析](#漏洞分析)
|
||||
- [参考资料](#参考资料)
|
||||
|
||||
|
||||
[下载文件](../src/exploit/7.1.9_ms_word_2010-2333)
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
## 漏洞分析
|
||||
|
||||
## 参考资料
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2333
|
29
doc/7.1.9_ms_word_2010-3333.md
Normal file
29
doc/7.1.9_ms_word_2010-3333.md
Normal file
@ -0,0 +1,29 @@
|
||||
# 7.1.9 cve-2010-3333 Microsoft Word RTF pFragments 栈溢出漏洞
|
||||
|
||||
- [漏洞描述](#漏洞描述)
|
||||
- [漏洞复现](#漏洞复现)
|
||||
- [漏洞分析](#漏洞分析)
|
||||
- [参考资料](#参考资料)
|
||||
|
||||
|
||||
[下载文件](../src/exploit/7.1.9_ms_word_2010-3333)
|
||||
|
||||
## 漏洞描述
|
||||
cve-2010-3333 漏洞是一个栈溢出漏洞,该漏洞是由于 Microsoft Office 软件中的 Open XML 文件格式转换器在处理 RTF 中的 "pFragments" 属性时存在栈溢出,可能导致任意代码执行。受影响的版本有:MS Office 2003 SP3、Office 2007 SP0、Office 2010 等。
|
||||
|
||||
|
||||
## 漏洞复现
|
||||
| |推荐使用的环境 | 备注 |
|
||||
| --- | --- | --- |
|
||||
| 操作系统 | Windows XP SP3 | 体系结构:32 位 |
|
||||
| 调试器 | OllyDbg | 版本号:吾爱专版 |
|
||||
| 反汇编器 | IDA Pro | 版本号:7.0 |
|
||||
| 漏洞软件 | MS Office | 版本号:2003 SP3 |
|
||||
|
||||
我们利用 Metasploit 来生成攻击样本
|
||||
|
||||
|
||||
## 漏洞分析
|
||||
|
||||
## 参考资料
|
||||
- https://www.cvedetails.com/cve/CVE-2010-2333
|
@ -9,5 +9,5 @@
|
||||
* [7.1.6 CVE-2017-9430 DNSTracer 栈溢出漏洞](7.1.6_dnstracer_2017-9430.md)
|
||||
* [7.1.7 CVE-2018-6323 GNU binutils elf_object_p 整型溢出漏洞](7.1.7_binutils_2018-6323.md)
|
||||
* [7.1.8 CVE-2010-2883 Adobe CoolType SING 表栈溢出漏洞](7.1.8_adobe_reader_2010-2883.md)
|
||||
* [7.1.9 CVE-2010-2333 Microsoft Word RTF pFragments 栈溢出漏洞](7.1.9_ms_word_2010-2333.md)
|
||||
* [7.1.9 CVE-2010-3333 Microsoft Word RTF pFragments 栈溢出漏洞](7.1.9_ms_word_2010-3333.md)
|
||||
* Malware
|
||||
|
Reference in New Issue
Block a user