diff --git a/README.md b/README.md index 60986d4..230051d 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,65 @@ -# 2024-wdb-Semis-CTF -第四届 网鼎杯 半决赛 专项技术挑战赛 +# 第四届 网鼎杯 半决赛 专项技术挑战赛 + +## 二进制安全 - BinarySecurity + +### 二进制漏洞挖掘 - cardmaster + +> 请卡牌大师们找出这台切牌机中的漏洞并获取 flag + +### 系统内核漏洞挖掘 - Generic_kernel_shellcode + +> Write a generic linux kernel shellcode? + +### 新编译技术漏洞 - jitlover + +> 这是一台不完全的 JIT 虚拟机,请找到其中的漏洞以获取 flag + +## 密码学 - Cryptography + +### RSA 加密分析 - equations + +> rsa 真的安全吗 + +### 序列密码加密分析 - noise + +> Let me tell you a story about noisy-nfsr. + +## 数据安全 - DataSecurity + +### 邮件数据分析 - Easy_Data + +> 公司的 DLP 软件报警了,并上传了一段流量。你能帮 bob 分析下为什么会产生报警么? + +### 数据安全协议分析 - Never Finish + +> 自定义 TLS 协议可能会存在安全问题,本题实现 TLS 的 Hello 部分,再利用 AES CFB 模式的性质伪造签名后的消息。 +> +> 端口为 23333,nc 正常无法连接上,需要根据 server 实现客户端链接。 + +## 新技术应用 - AdvanceTechnology + +### 车联网日志分析 - V2XLogAnalysis + +> 车内日志的秘密,日志也能注入? + +### IOT 应用容器漏洞 - signin + +> 难道这是真正的登陆入口吗? + +### IOT 网络协议分析 - babyRTP + +> 这是一个双端都会推流的服务 + +### 5G 网络隐私保护 - Get_supi + +> 在某些场景下,LTE 网络中用户的 IMSI 会在空口暴露,5G 网络是如何进行隐私保护的?网络侧如何得到用户的 SUPI?(提交请加上 flag{}) + +## 逆向安全 - ReverseSecurity + +### python逆向分析 - compress + +> 一个幽灵,一个EOL的幽灵在代码审计中游荡。 + +### 网络通信流量分析 - socket + +> 小鼎同学在日常运维排查中发现了异常通信流量,通过初步定位分析,他获得了客户端、服务端程序以及相关流量,请帮他找出其中异常敏感数据! diff --git a/raw-api-data/27c2d11c2a1b96281f802af67a1f4d12.json b/raw-api-data/27c2d11c2a1b96281f802af67a1f4d12.json new file mode 100644 index 0000000..22c3933 --- /dev/null +++ b/raw-api-data/27c2d11c2a1b96281f802af67a1f4d12.json @@ -0,0 +1,39 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311831.181361, + "data": { + "resource_id": "27c2d11c2a1b96281f802af67a1f4d12", + "name": "新编译技术漏洞", + "desc": "jitlover\n这是一台不完全的JIT虚拟机,请找到其中的漏洞以获取flag", + "attachment": { + "name": "ce834e1434804f22bb7c6deb9c01b6ab.zip", + "url": "/cpms/oj/practice_attachment/482e8e5a7f814e00831c5f2e02709f97.zip", + "md5": "6abe8cf7f935a85654620fb55c955b86" + }, + "with_scene": true, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 1, + "scene_config": { + "id": "23b1115c238943059d3e4af70fd00e38", + "cscene": null, + "name": "新编译技术漏洞", + "reference_type": 302, + "scene_config": { + "topology": { + "scene": { + "eid": "5ac798cc8b54456395e38d4492d37c66", + "name": "新编译技术漏洞", + "description": "" + } + } + } + } + } +} \ No newline at end of file diff --git a/raw-api-data/2fd2c782365c5f35e325a6a7413b71fb.json b/raw-api-data/2fd2c782365c5f35e325a6a7413b71fb.json new file mode 100644 index 0000000..bbd99f8 --- /dev/null +++ b/raw-api-data/2fd2c782365c5f35e325a6a7413b71fb.json @@ -0,0 +1,39 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311851.012546, + "data": { + "resource_id": "2fd2c782365c5f35e325a6a7413b71fb", + "name": "IOT网络协议分析", + "desc": "babyRTP\n这是一个双端都会推流的服务", + "attachment": { + "name": "e7f4bbee4896463283241de2a792dc38.zip", + "url": "/cpms/oj/practice_attachment/a250dee185504fb5b59078f0641b2604.zip", + "md5": "1086395b7500e7b04fe649b22b24fca1" + }, + "with_scene": true, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 0, + "scene_config": { + "id": "1f8787a254084ca3bc6c3da3beeed2ab", + "cscene": null, + "name": "IOT网络协议分析", + "reference_type": 302, + "scene_config": { + "topology": { + "scene": { + "eid": "f1f04363feb04d258fb24b6f96d66702", + "name": "IOT网络协议分析", + "description": "" + } + } + } + } + } +} \ No newline at end of file diff --git a/raw-api-data/3dee8e1fefacfc19257c13abf9daa5f3.json b/raw-api-data/3dee8e1fefacfc19257c13abf9daa5f3.json new file mode 100644 index 0000000..4a9c835 --- /dev/null +++ b/raw-api-data/3dee8e1fefacfc19257c13abf9daa5f3.json @@ -0,0 +1,24 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311869.295138, + "data": { + "resource_id": "3dee8e1fefacfc19257c13abf9daa5f3", + "name": "网络通信流量分析", + "desc": "socket\n小鼎同学在日常运维排查中发现了异常通信流量,通过初步定位分析,他获得了客户端、服务端程序以及相关流量,请帮他找出其中异常敏感数据!", + "attachment": { + "name": "0705a3b79ea5468ab52dce250a9452a6.zip", + "url": "/cpms/oj/practice_attachment/a5f23b234e5d474fb1c834138e3a57f9.zip", + "md5": "12807b1f2b06766acc1be553b8b78e78" + }, + "with_scene": false, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": true, + "solved_score": 89.58, + "solved_rank": 52, + "recycle": null, + "flag_type": 0 + } +} \ No newline at end of file diff --git a/raw-api-data/4068341c35fb0ece0fe3950e588c1435.json b/raw-api-data/4068341c35fb0ece0fe3950e588c1435.json new file mode 100644 index 0000000..d8a7da3 --- /dev/null +++ b/raw-api-data/4068341c35fb0ece0fe3950e588c1435.json @@ -0,0 +1,39 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311736.880331, + "data": { + "resource_id": "4068341c35fb0ece0fe3950e588c1435", + "name": "IOT应用容器漏洞", + "desc": "signin\n难道这是真正的登陆入口吗?", + "attachment": { + "name": "88d1e1e8ba6c40ba8250b1c8cba39f2f.zip", + "url": "/cpms/oj/practice_attachment/4079206a075a4f1c8d4f7b48e9825284.zip", + "md5": "252aa502fe1e4ecd74b94c46e1a31d23" + }, + "with_scene": true, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 1, + "scene_config": { + "id": "87959f32433b410595ebf74ab2b0b02d", + "cscene": null, + "name": "IOT应用容器漏洞", + "reference_type": 302, + "scene_config": { + "topology": { + "scene": { + "eid": "e7a199d177314eb386af689f4803a55d", + "name": "IOT应用容器漏洞", + "description": "" + } + } + } + } + } +} \ No newline at end of file diff --git a/raw-api-data/4925dc76e06f5a37608a45c43a85f6ce.json b/raw-api-data/4925dc76e06f5a37608a45c43a85f6ce.json new file mode 100644 index 0000000..9aa2143 --- /dev/null +++ b/raw-api-data/4925dc76e06f5a37608a45c43a85f6ce.json @@ -0,0 +1,24 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311617.031705, + "data": { + "resource_id": "4925dc76e06f5a37608a45c43a85f6ce", + "name": "邮件数据分析", + "desc": "Easy_Data\n公司的DLP软件报警了,并上传了一段流量。你能帮bob分析下为什么会产生报警么?", + "attachment": { + "name": "misc_easy_data.zip", + "url": "/ct/upload/other/57edf1fbb5056961a908b8aeff0ac1e9.zip", + "md5": "b882e83622d005e337cec1fe59af6a8f" + }, + "with_scene": false, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": true, + "solved_score": 118.06, + "solved_rank": 11, + "recycle": null, + "flag_type": 0 + } +} \ No newline at end of file diff --git a/raw-api-data/5552c5250d3d1fb5f2c83ea138f359ae.json b/raw-api-data/5552c5250d3d1fb5f2c83ea138f359ae.json new file mode 100644 index 0000000..5f11730 --- /dev/null +++ b/raw-api-data/5552c5250d3d1fb5f2c83ea138f359ae.json @@ -0,0 +1,39 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311669.601985, + "data": { + "resource_id": "5552c5250d3d1fb5f2c83ea138f359ae", + "name": "二进制漏洞挖掘", + "desc": "cardmaster\n请卡牌大师们找出这台切牌机中的漏洞并获取flag", + "attachment": { + "name": "6a4ca062e7aa489eba566b0839de1213.zip", + "url": "/cpms/oj/practice_attachment/f76b323090644b81a0c76b0cfd1a5c70.zip", + "md5": "001a97c9bee1f4cc5bc7f650b3def601" + }, + "with_scene": true, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 1, + "scene_config": { + "id": "e3142fef464244638e583af173cbf6e6", + "cscene": null, + "name": "二进制漏洞挖掘", + "reference_type": 302, + "scene_config": { + "topology": { + "scene": { + "eid": "a8caac97b0ff4901ae6b15a925b71a10", + "name": "二进制漏洞挖掘", + "description": "" + } + } + } + } + } +} \ No newline at end of file diff --git a/raw-api-data/6f48f0ac82b486fc034eed607ee01d01.json b/raw-api-data/6f48f0ac82b486fc034eed607ee01d01.json new file mode 100644 index 0000000..41f4f79 --- /dev/null +++ b/raw-api-data/6f48f0ac82b486fc034eed607ee01d01.json @@ -0,0 +1,24 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311509.434277, + "data": { + "resource_id": "6f48f0ac82b486fc034eed607ee01d01", + "name": "RSA加密分析", + "desc": "equations\nrsa真的安全吗", + "attachment": { + "name": "b9f78ade9b8948fb8dab35c1db0f9299.zip", + "url": "/cpms/oj/practice_attachment/99a0e368ef5d43d3b19f7a6f581a0c3d.zip", + "md5": "675abffc4a38c1c843ed63297103c103" + }, + "with_scene": false, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 0 + } +} \ No newline at end of file diff --git a/raw-api-data/98c9838c62d6397a13008f5c3ba5eaa1.json b/raw-api-data/98c9838c62d6397a13008f5c3ba5eaa1.json new file mode 100644 index 0000000..7b1ef9b --- /dev/null +++ b/raw-api-data/98c9838c62d6397a13008f5c3ba5eaa1.json @@ -0,0 +1,39 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311757.425765, + "data": { + "resource_id": "98c9838c62d6397a13008f5c3ba5eaa1", + "name": "序列密码加密分析", + "desc": "noise\nLet me tell you a story about noisy-nfsr.", + "attachment": { + "name": "attachments.zip", + "url": "/ct/upload/other/d17b9250825ee0c02cfd59fefce537d2.zip", + "md5": "9ee07e809fd25e7c498789c6429110cf" + }, + "with_scene": true, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 1, + "scene_config": { + "id": "af6e385f077f4ecbbb99a2e5b9c36d0a", + "cscene": null, + "name": "序列密码加密分析", + "reference_type": 302, + "scene_config": { + "topology": { + "scene": { + "eid": "4d3273f1ba3d4a08a85cf722791563bb", + "name": "序列密码加密分析", + "description": "" + } + } + } + } + } +} \ No newline at end of file diff --git a/raw-api-data/a4df1ae3b58ca3ddcc09095c1b8a49fe.json b/raw-api-data/a4df1ae3b58ca3ddcc09095c1b8a49fe.json new file mode 100644 index 0000000..5207f2a --- /dev/null +++ b/raw-api-data/a4df1ae3b58ca3ddcc09095c1b8a49fe.json @@ -0,0 +1,39 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311699.098224, + "data": { + "resource_id": "a4df1ae3b58ca3ddcc09095c1b8a49fe", + "name": "数据安全协议分析", + "desc": "Never Finish\n自定义TLS协议可能会存在安全问题,本题实现 TLS 的 Hello 部分,再利用 AES CFB 模式的性质伪造签名后的消息。\n\n端口为23333,nc正常无法连接上,需要根据server实现客户端链接。", + "attachment": { + "name": "ba3489b311cc44d1a57cd4eee1b16787.zip", + "url": "/cpms/oj/practice_attachment/6cd59289661d42ca92b31363615f1704.zip", + "md5": "32fded862198987b2b0a544a9f15f6a5" + }, + "with_scene": true, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 1, + "scene_config": { + "id": "5fd0e80bff464ad1b339a95f3484ac3c", + "cscene": null, + "name": "数据安全协议分析", + "reference_type": 302, + "scene_config": { + "topology": { + "scene": { + "eid": "0bfc664c66994e7cadeb558e1a0af4dc", + "name": "数据安全协议分析", + "description": "" + } + } + } + } + } +} \ No newline at end of file diff --git a/raw-api-data/a59b4babf83de05cc35a4d710126aabd.json b/raw-api-data/a59b4babf83de05cc35a4d710126aabd.json new file mode 100644 index 0000000..5b24e18 --- /dev/null +++ b/raw-api-data/a59b4babf83de05cc35a4d710126aabd.json @@ -0,0 +1,39 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311573.508412, + "data": { + "resource_id": "a59b4babf83de05cc35a4d710126aabd", + "name": "车联网日志分析", + "desc": "车内日志的秘密,日志也能注入?", + "attachment": { + "name": "55ae699fe15e4eb58dbfff74092d1826.zip", + "url": "/cpms/oj/practice_attachment/b1935840442e4dd796ab1a564dc32aa9.zip", + "md5": "b3a480ff4fa05ad6f0368632fd4bbfc6" + }, + "with_scene": true, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 1, + "scene_config": { + "id": "df40241e229f4c24b24c4b0a50762e1a", + "cscene": null, + "name": "车联网日志分析", + "reference_type": 302, + "scene_config": { + "topology": { + "scene": { + "eid": "1898e07c01de421fb825c59aae11fa70", + "name": "车联网日志分析", + "description": "" + } + } + } + } + } +} \ No newline at end of file diff --git a/raw-api-data/checkpoints.json b/raw-api-data/checkpoints.json new file mode 100644 index 0000000..fddf4f5 --- /dev/null +++ b/raw-api-data/checkpoints.json @@ -0,0 +1,322 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311395.068269, + "data": { + "total": 13, + "list": [ + { + "resource_id": "6f48f0ac82b486fc034eed607ee01d01", + "name": "RSA加密分析", + "score": 596.67, + "solved": 1, + "direction": "密码学", + "is_solved": false, + "top_three": [ + { + "name": "NISA-CarpeDiem", + "identify_key": 607, + "resource_id": "ce51e747f6c734bd21ff9b8554022f22", + "rank": 1 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 0, + "online": true + }, + { + "resource_id": "a59b4babf83de05cc35a4d710126aabd", + "name": "车联网日志分析", + "score": 795.56, + "solved": 1, + "direction": "新技术应用", + "is_solved": false, + "top_three": [ + { + "name": "noname", + "identify_key": 611, + "resource_id": "adac8d2da399f62100f153ea296e839e", + "rank": 1 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 1, + "online": true + }, + { + "resource_id": "4925dc76e06f5a37608a45c43a85f6ce", + "name": "邮件数据分析", + "score": 25, + "solved": 153, + "direction": "数据安全", + "is_solved": true, + "top_three": [ + { + "name": "or4nge", + "identify_key": 587, + "resource_id": "1229feedce345f63e530d9a7bcf01c9b", + "rank": 1 + }, + { + "name": "SSSec000", + "identify_key": 596, + "resource_id": "234aec31d5984e63f9ad5a2e4384a896", + "rank": 2 + }, + { + "name": "0ops-2", + "identify_key": 667, + "resource_id": "e238b74d113f5f827228106b925f4992", + "rank": 3 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 0, + "online": true + }, + { + "resource_id": "f9ba4ce3c37b51857fa195ce1eeecb72", + "name": "python逆向分析", + "score": 600, + "solved": 0, + "direction": "逆向安全", + "is_solved": false, + "top_three": [], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 2, + "online": true + }, + { + "resource_id": "5552c5250d3d1fb5f2c83ea138f359ae", + "name": "二进制漏洞挖掘", + "score": 412.5, + "solved": 15, + "direction": "二进制安全", + "is_solved": false, + "top_three": [ + { + "name": "泥巴睡觉", + "identify_key": 582, + "resource_id": "276635ccdb033c29f3355b85f0f591a5", + "rank": 1 + }, + { + "name": "0ops", + "identify_key": 514, + "resource_id": "18c1d0eecd9cf2bdfc4fabe3ee5086cd", + "rank": 2 + }, + { + "name": "小清华", + "identify_key": 679, + "resource_id": "c465ad2a80dec11b88ae0750923ec498", + "rank": 3 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 1, + "online": true + }, + { + "resource_id": "a4df1ae3b58ca3ddcc09095c1b8a49fe", + "name": "数据安全协议分析", + "score": 447.5, + "solved": 1, + "direction": "数据安全", + "is_solved": false, + "top_three": [ + { + "name": "volcana", + "identify_key": 585, + "resource_id": "b6cc28c6e0f418290733b671c6804263", + "rank": 1 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 1, + "online": true + }, + { + "resource_id": "4068341c35fb0ece0fe3950e588c1435", + "name": "IOT应用容器漏洞", + "score": 800, + "solved": 0, + "direction": "新技术应用", + "is_solved": false, + "top_three": [], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 1, + "online": true + }, + { + "resource_id": "98c9838c62d6397a13008f5c3ba5eaa1", + "name": "序列密码加密分析", + "score": 1000, + "solved": 0, + "direction": "密码学", + "is_solved": false, + "top_three": [], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 1, + "online": true + }, + { + "resource_id": "e76c8a2426cab8f7fa947665e681c61a", + "name": "系统内核漏洞挖掘", + "score": 988.89, + "solved": 2, + "direction": "二进制安全", + "is_solved": false, + "top_three": [ + { + "name": "Air2top", + "identify_key": 520, + "resource_id": "4fec3769b01d28f848554b1bb9e65e17", + "rank": 1 + }, + { + "name": "0ops", + "identify_key": 514, + "resource_id": "3a40f8db647818d2b543b36e8c222746", + "rank": 2 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 0, + "online": true + }, + { + "resource_id": "27c2d11c2a1b96281f802af67a1f4d12", + "name": "新编译技术漏洞", + "score": 1000, + "solved": 0, + "direction": "二进制安全", + "is_solved": false, + "top_three": [], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 1, + "online": true + }, + { + "resource_id": "2fd2c782365c5f35e325a6a7413b71fb", + "name": "IOT网络协议分析", + "score": 430, + "solved": 8, + "direction": "新技术应用", + "is_solved": false, + "top_three": [ + { + "name": "or4nge", + "identify_key": 587, + "resource_id": "1d79b9037725bf2faa07353982fb9796", + "rank": 1 + }, + { + "name": "晚上吃什么", + "identify_key": 608, + "resource_id": "6440ac244749c5417acbe913d31393f0", + "rank": 2 + }, + { + "name": "WXYZ", + "identify_key": 542, + "resource_id": "6f68eae6cfed856b7bd6f3ecb1e34728", + "rank": 3 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 0, + "online": true + }, + { + "resource_id": "3dee8e1fefacfc19257c13abf9daa5f3", + "name": "网络通信流量分析", + "score": 47.92, + "solved": 111, + "direction": "逆向安全", + "is_solved": true, + "top_three": [ + { + "name": "天枢Dubhe", + "identify_key": 598, + "resource_id": "358b0c5f854af10a07a1005c7f46c226", + "rank": 1 + }, + { + "name": "X0RSEC", + "identify_key": 518, + "resource_id": "6af0ccc898910658ce2a1d5f10ec71d7", + "rank": 2 + }, + { + "name": "0ops", + "identify_key": 514, + "resource_id": "2fc5c9e2e65d6349bcb2ad096b0fa92e", + "rank": 3 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 0, + "online": true + }, + { + "resource_id": "d6ec408520726f34d5feef4c77b00007", + "name": "5G网络隐私保护", + "score": 243.33, + "solved": 107, + "direction": "新技术应用", + "is_solved": true, + "top_three": [ + { + "name": "泥巴睡觉", + "identify_key": 582, + "resource_id": "cff157252fb8db2775c33a713d2d8ef7", + "rank": 1 + }, + { + "name": "圣地亚哥皮蛋", + "identify_key": 592, + "resource_id": "e29a11a7deb3486b13f72f82a4716f10", + "rank": 2 + }, + { + "name": "F_Cat", + "identify_key": 649, + "resource_id": "447c363c28d227539793e49f06c8f9e5", + "rank": 3 + } + ], + "is_notice": false, + "unreceived_notice": false, + "cd_hot_value": 100, + "flag_type": 2, + "online": true + } + ] + } +} \ No newline at end of file diff --git a/raw-api-data/d6ec408520726f34d5feef4c77b00007.json b/raw-api-data/d6ec408520726f34d5feef4c77b00007.json new file mode 100644 index 0000000..df61d69 --- /dev/null +++ b/raw-api-data/d6ec408520726f34d5feef4c77b00007.json @@ -0,0 +1,24 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311901.64726, + "data": { + "resource_id": "d6ec408520726f34d5feef4c77b00007", + "name": "5G网络隐私保护", + "desc": "Get_supi\n\n在某些场景下,LTE网络中用户的IMSI会在空口暴露,5G网络是如何进行隐私保护的?网络侧如何得到用户的SUPI?(提交请加上flag{})", + "attachment": { + "name": "5G网络隐私保护.zip", + "url": "/cpms/oj/practice_attachment/6b8aa8c167ab427ca3ac1b20012d2db3.zip", + "md5": "547afc69d6635e73d97e171d407a141e" + }, + "with_scene": false, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": true, + "solved_score": 433.33, + "solved_rank": 51, + "recycle": null, + "flag_type": 2 + } +} \ No newline at end of file diff --git a/raw-api-data/e76c8a2426cab8f7fa947665e681c61a.json b/raw-api-data/e76c8a2426cab8f7fa947665e681c61a.json new file mode 100644 index 0000000..786ddeb --- /dev/null +++ b/raw-api-data/e76c8a2426cab8f7fa947665e681c61a.json @@ -0,0 +1,39 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311805.963118, + "data": { + "resource_id": "e76c8a2426cab8f7fa947665e681c61a", + "name": "系统内核漏洞挖掘", + "desc": "Generic_kernel_shellcode\nWrite a generic linux kernel shellcode?", + "attachment": { + "name": "5673aed554ce4c28af5ba213a78421f7.zip", + "url": "/cpms/oj/practice_attachment/363700c248284beb94f7efd8a3a1899f.zip", + "md5": "62a55eae47a94b752d9fa093518eff4c" + }, + "with_scene": true, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 0, + "scene_config": { + "id": "48072e1786ec4406b2a86cd1352a2af7", + "cscene": null, + "name": "系统内核漏洞挖掘", + "reference_type": 302, + "scene_config": { + "topology": { + "scene": { + "eid": "06e48b9ede2f4e43b3e5e7b430ff0310", + "name": "系统内核漏洞挖掘", + "description": "" + } + } + } + } + } +} \ No newline at end of file diff --git a/raw-api-data/f9ba4ce3c37b51857fa195ce1eeecb72.json b/raw-api-data/f9ba4ce3c37b51857fa195ce1eeecb72.json new file mode 100644 index 0000000..a9e1082 --- /dev/null +++ b/raw-api-data/f9ba4ce3c37b51857fa195ce1eeecb72.json @@ -0,0 +1,24 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311648.34769, + "data": { + "resource_id": "f9ba4ce3c37b51857fa195ce1eeecb72", + "name": "python逆向分析", + "desc": "compress\n一个幽灵,一个EOL的幽灵在代码审计中游荡。", + "attachment": { + "name": "python逆向分析.zip", + "url": "/cpms/oj/practice_attachment/a502520fe6574a8dbc54937706b79ef9.zip", + "md5": "43b74415d95035fd03ce31a5467b4764" + }, + "with_scene": false, + "with_scene_inst": false, + "enroll_id": "f7241ef83f79af0d91944fcff3a4262d", + "is_solved": false, + "solved_score": 0, + "solved_rank": 0, + "recycle": null, + "flag_type": 2 + } +} \ No newline at end of file diff --git a/raw-api-data/summary.json b/raw-api-data/summary.json new file mode 100644 index 0000000..9e8553d --- /dev/null +++ b/raw-api-data/summary.json @@ -0,0 +1,33 @@ +{ + "code": "AD-000000", + "message": "", + "detail": "", + "timestamp": 1732311394.542213, + "data": [ + { + "direction": "二进制安全", + "total": 3, + "solved_quantity": 0 + }, + { + "direction": "密码学", + "total": 2, + "solved_quantity": 0 + }, + { + "direction": "数据安全", + "total": 2, + "solved_quantity": 1 + }, + { + "direction": "新技术应用", + "total": 4, + "solved_quantity": 1 + }, + { + "direction": "逆向安全", + "total": 2, + "solved_quantity": 1 + } + ] +} \ No newline at end of file