/images/avatar.jpg

FileStore

0X1 Source Code 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 # Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for

Shenzhen-Office

0X1 简要概述 题目给出了两个文件: -encodings (这里面涉及的内容均为该Chall的提示) -chall.txt (根据encodings编码后的内容) 本题的基本思路就是根据encodings所给的hints去一层层的解chall.txt中的编码。 0x2 EXPLOITED chall.txt中的内容大致如下, chall.txt中的内容" chall.txt中的内容 观察到chall.txt文件中的内容均为可见字符,根据encodings中的提示{a weird base, much higher than base64}

MD-Notes

​ 后端编写语言:GO ​ 前端编写语言:HTML && JavaScript ​ 本地镜像搭建:因为众所周知的原因,我们在国内拉取Go依赖镜像时相当的慢,并且有可能根本无法进行连接下载,我们需要在Dockerfile中或使用Go本身去配置代理选项的使用。通过在终端上或在Dockerfile中执行下面的语句我们可以配置国内代理, 1 RUN go env -w GOPROXY="https://goproxy.cn,direct" 业务逻辑分析与代码审查 ​ 代理配置完后我们直接来看题目,直接进入到http://localho