792words1 mins.

# Keeping on Schedule One of our computers on the company network had some malware on it. We think we cleared of the main payload however it came back. Can you check for any signs of persistence? We are able to provide you a copy of the registry, the sooner the better! For any registry related chall
810words1 mins.

# Mystery Signal II I was listening to my scanner when I heard a strange signal. Can you decode it? Download Challenge File(s): [Click Here](https://github.com/UMBCCyberDawgs/dawgctf-sp25/tree/main/Mystery Signal II) # Writeup 首先拿到了一个 MP3 文件,像外星语。 # 分析 MMSSTV 先把 MP
1.3kwords1 mins.

# My Aquarium I have this website with some of my favorite sea animal images and facts. I have a secret document containing an my favorite animal, can you find it? The website is running at http://connect.umbccd.net:20010 # writeup 打开之后有一个网页, 有几个 Button: See Sea Animals: 有一些图片 See Animal
12kwords11 mins.

# Oh no, my computer! # 题目 As an Incident Response (IR) analyst, you've been contacted by the HR department regarding a recently terminated employee. Upon learning of their impending dismissal, the employee reportedly proceeded to hurl their workstation out the window from the 66th floor. Fortun
3.9kwords4 mins.

# The Fractalist 给定一些复数 t-1.2499999999999993-0.03999999999999925i-0.4199999999999986+0.6000000000000011i-0.24999999999999845-0.6399999999999997i-1.2099999999999993-0.16999999999999926i0.08000000000000164-0.6299999999999997i0.3600000000000018-0.3199999999999994i0.3300000000000018+0.520000000000001i-0
336words1 mins.

# The Bird 题目是下面的图片 可以用 google 识图搜索,发现是 bird crypto https://kryptografie.de/kryptografie/chiffre/birds-on-a-wire.htm 这里面有 DawgCTF{there_is_no_escape}
832words1 mins.

我们从 C 语言的编译开始引入,比如 cint main(int argc, char *argv[]){ int c = 0; for (int i=0; i<10; i++) { c = c + i; } printf("Ergebnis ist %i\n",c);}C 语言的源代码经过编译会变成可执行文件 lgcc count.c -O0 -g -o count我们可以用 hexdump count 来查看这个可执行文件,会发现是二进制文件 # 二进
495words1 mins.

这个网站的 reset password 会把 token 发送到 email 里面,但是这个 token 可以重置任意的 email。我们从 database.js 里面得知管理员的账户是 admin@armaxis.htb , 于是我们用 test@email.htb 申请一个账户并且拿到重置密码的 token,然后用 hackbar 发送一个 reset-password 的请求,可以在 index.js 里面看到这个,它会读取 post 的三个参数并且重置密码。这样我们重置了管理员账户的密码登录上去。 第二步是,disbute weapon 里面会有个 markdown
319words1 mins.

# HTB Flag command 从开发者工具里面抓包,找到游戏的 main.js ,里面发现有个 fetchOptions 里面通过发送请求,得到所有可以执行的命令。然后在开发者工具的抓包里面看到 options 就是这个请求,我们打开看看请求返回的内容,在里面得到看到一个 secret 的命令 Blip-blop, in a pickle with a hiccup! Shmiggity-shmack 。 在游戏 start 后,输入这个命令,就可以得到 flag 了 lHTB{D3v3l0p3r_t00l5_4r3_b35t__t0015_wh4t_d0_y0
1.1kwords1 mins.

# 题目描述 (无附件) # 观察 打开网站: 注册个账号然后登录试试: 查看当前 cookie: 这段内容 base64 解码可以得到: eyJ1c2VybmFtZSI6IjEyMyJ9 {"username":"123"} # 渗透 将 cookie 改成 {"username":"admin"} 的 base64,即 eyJ1c2VybmFtZSI6ImFkbWluIn0= 修改 cookie 然后刷新网页: 得到 flag: HTB&#