-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.xml
92 lines (92 loc) · 7.04 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
<channel>
<title>kdxcxs</title>
<link>https://kdxcxs.github.io/</link>
<description>This is my cool site</description>
<generator>Hugo -- gohugo.io</generator><language>zh-CN</language><managingEditor>[email protected] (kdxcxs)</managingEditor>
<webMaster>[email protected] (kdxcxs)</webMaster><lastBuildDate>Mon, 01 Jan 2024 00:00:00 +0800</lastBuildDate>
<atom:link href="https://kdxcxs.github.io/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>My 2023</title>
<link>https://kdxcxs.github.io/posts/soliloquy/my-2023/</link>
<pubDate>Mon, 01 Jan 2024 00:00:00 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/soliloquy/my-2023/</guid>
<description><![CDATA[我的 2023 或许要从 2022 的 10 月 21 日说起。 梦开始的地方 那是一个守望先锋还没退出国服的下午,我跟室友正在新皇后街感受宁静,结果就收到了 crazyman 发来的消息,本来]]></description>
</item>
<item>
<title>CISCN国赛东南赛区出题小记</title>
<link>https://kdxcxs.github.io/posts/wp/ciscn%E5%9B%BD%E8%B5%9B%E4%B8%9C%E5%8D%97%E8%B5%9B%E5%8C%BA%E5%87%BA%E9%A2%98%E5%B0%8F%E8%AE%B0/</link>
<pubDate>Mon, 26 Jun 2023 09:09:47 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/wp/ciscn%E5%9B%BD%E8%B5%9B%E4%B8%9C%E5%8D%97%E8%B5%9B%E5%8C%BA%E5%87%BA%E9%A2%98%E5%B0%8F%E8%AE%B0/</guid>
<description><![CDATA[好久没写博客了,正好出题写了 wp,就放上来水一下吧。这次难度控制的不是很好,fix 很简单,但是攻击只有 1 解,不过希望师傅们游戏玩得开心。 拿到]]></description>
</item>
<item>
<title>任意文件读拿下宝塔</title>
<link>https://kdxcxs.github.io/posts/cyber-security/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E6%8B%BF%E4%B8%8B%E5%AE%9D%E5%A1%94/</link>
<pubDate>Fri, 07 Apr 2023 23:45:39 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/cyber-security/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E6%8B%BF%E4%B8%8B%E5%AE%9D%E5%A1%94/</guid>
<description><![CDATA[前言 两个月前 v2 冲浪的时候看到一个叫做 siteproxy 的项目,可以实现网站的反向代理,看着项目不大就顺手点开了源码,一眼抓到一个目录穿越,然后又抱着试一试的]]></description>
</item>
<item>
<title>bi0sCTF 2022 web wp</title>
<link>https://kdxcxs.github.io/posts/wp/bi0sctf-2022-web-wp/</link>
<pubDate>Mon, 23 Jan 2023 15:57:28 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/wp/bi0sctf-2022-web-wp/</guid>
<description><![CDATA[bi0sCTF 2022 web 题目 这次比赛主要就看了 PyCGI 和 Vuln-Drive 2 两个题目,又是学习的一天。 题目的环境我都放到上面的 Github 里面了,感兴趣的师傅们自取。 Vuln-Drive 2 环境速览 首先来看一下]]></description>
</item>
<item>
<title>idekctf 2022* task manager wp</title>
<link>https://kdxcxs.github.io/posts/wp/idekctf-2022-task-manager-wp/</link>
<pubDate>Sat, 21 Jan 2023 14:24:55 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/wp/idekctf-2022-task-manager-wp/</guid>
<description><![CDATA[题目有点原型链污染的味道,也可以说是借鉴了 pyjail 的一些思路,很有意思的一道题目。 先来看看源码: app.py from flask import Flask, render_template, request, redirect from taskmanager import TaskManager import os app = Flask(__name__) @app.before_first_request def init(): if app.env == 'yolo': app.add_template_global(eval)]]></description>
</item>
<item>
<title>idekctf 2022* PHPFu...n wp</title>
<link>https://kdxcxs.github.io/posts/wp/idekctf-2022-phpfu...n-wp/</link>
<pubDate>Sat, 21 Jan 2023 14:00:50 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/wp/idekctf-2022-phpfu...n-wp/</guid>
<description><![CDATA[题目限制了只能有以下几个字符 ([.^])', 基本思路就是用现有的字符造更多的字符,但是因为只要一报错就会 die() ,所以不能用包括 [].'' 在内的很多方式,只能从现有的开]]></description>
</item>
<item>
<title>idekctf 2023 wp</title>
<link>https://kdxcxs.github.io/posts/wp/idekctf-2023-wp/</link>
<pubDate>Tue, 17 Jan 2023 12:46:26 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/wp/idekctf-2023-wp/</guid>
<description><![CDATA[因为放假了时间多了起来,难得专注的跟 r3kapig 的师傅们一起打了个比赛,最后拿到了第二,不少题目都很有意思,复盘记录一下。 web task manager 题目有点原型链污染的味]]></description>
</item>
<item>
<title>hack.lu 2022 HTPL wp</title>
<link>https://kdxcxs.github.io/posts/wp/hack.lu-2022-htpl-wp/</link>
<pubDate>Fri, 18 Nov 2022 00:35:37 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/wp/hack.lu-2022-htpl-wp/</guid>
<description><![CDATA[Background The challenge implements a language called Hyper Text Programming Language, which defined some tags and compiles them into javascript to make html could do real computation.
Solution First we noticed that the HTPL code we wrote renders via innerHTML, but the strict CSP makes it unexploitable.
So let’s turn to the HTPL part. The HTPL code’s compilation is based on ast, which supports only a few nodes: io, array, function, literals, binary and unary operators, assignments and control flows.]]></description>
</item>
<item>
<title>dpkg 卸载时出现 error processing package</title>
<link>https://kdxcxs.github.io/posts/server/dpkg-%E5%8D%B8%E8%BD%BD%E6%97%B6%E5%87%BA%E7%8E%B0-error-processing-package/</link>
<pubDate>Sun, 09 Oct 2022 09:40:24 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/server/dpkg-%E5%8D%B8%E8%BD%BD%E6%97%B6%E5%87%BA%E7%8E%B0-error-processing-package/</guid>
<description><![CDATA[之前在 wsl 上面安装了 n2n,但是因为 wsl 上面没有 systemd,导致了安装失败。在卸载的时候又提示: ➜ sudo dpkg -r n2n (Reading database ... 110162 files and directories currently installed.) Removing n2n (3.0.0-1038) ... System has not been]]></description>
</item>
<item>
<title>frida内购破解</title>
<link>https://kdxcxs.github.io/posts/cyber-security/frida%E5%86%85%E8%B4%AD%E7%A0%B4%E8%A7%A3/</link>
<pubDate>Mon, 12 Sep 2022 10:12:23 +0800</pubDate>
<author>kdxcxs</author>
<guid>https://kdxcxs.github.io/posts/cyber-security/frida%E5%86%85%E8%B4%AD%E7%A0%B4%E8%A7%A3/</guid>
<description><![CDATA[frida 是一个非常强大的 hook 框架,多平台通吃,这篇文章演示一下 iOS 平台简单的内购破解。 思路 简单来说每次内购都会在 SKPaymentQueue 中 push 一个 SKPaymentTransaction 用来记录当前这次内购的基本]]></description>
</item>
</channel>
</rss>