ctf-wiki.mahaloz.re
Open in
urlscan Pro
2606:4700:3037::ac43:817a
Public Scan
Submitted URL: http://ctf-wiki.mahaloz.re/
Effective URL: https://ctf-wiki.mahaloz.re/
Submission: On March 04 via api from US — Scanned from DE
Effective URL: https://ctf-wiki.mahaloz.re/
Submission: On March 04 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMName: search —
<form class="md-search__form" name="search">
<input type="text" class="md-search__input" name="query" aria-label="Search" placeholder="Search" autocapitalize="off" autocorrect="off" autocomplete="off" spellcheck="false" data-md-component="search-query" data-md-state="active" required="">
<label class="md-search__icon md-icon" for="__search">
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
<path d="M9.5 3A6.5 6.5 0 0 1 16 9.5c0 1.61-.59 3.09-1.56 4.23l.27.27h.79l5 5-1.5 1.5-5-5v-.79l-.27-.27A6.516 6.516 0 0 1 9.5 16 6.5 6.5 0 0 1 3 9.5 6.5 6.5 0 0 1 9.5 3m0 2C7 5 5 7 5 9.5S7 14 9.5 14 14 12 14 9.5 12 5 9.5 5z"></path>
</svg>
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
<path d="M20 11v2H8l5.5 5.5-1.42 1.42L4.16 12l7.92-7.92L13.5 5.5 8 11h12z"></path>
</svg>
</label>
<button type="reset" class="md-search__icon md-icon" aria-label="Clear" tabindex="-1">
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24">
<path d="M19 6.41 17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12 19 6.41z"></path>
</svg>
</button>
</form>
<form id="gitalk-form" onsubmit="return false;">
<div id="gitalk-container">
<div class="gt-container">
<div class="gt-meta"><span class="gt-counts"><a class="gt-link gt-link-counts" href="https://github.com/ctf-wiki/comment/issues/2" target="_blank" rel="noopener noreferrer">1</a> comment</span>
<div class="gt-user">
<div class="gt-user-inner"><span class="gt-user-name">Anonymous</span><span class="gt-ico gt-ico-arrdown"><span class="gt-svg"><svg viewBox="0 0 1024 1024" xmlns="http://www.w3.org/2000/svg" p-id="1619">
<path
d="M511.872 676.8c-0.003 0-0.006 0-0.008 0-9.137 0-17.379-3.829-23.21-9.97l-251.277-265.614c-5.415-5.72-8.743-13.464-8.744-21.984 0-17.678 14.33-32.008 32.008-32.008 9.157 0 17.416 3.845 23.25 10.009l228.045 241.103 228.224-241.088c5.855-6.165 14.113-10.001 23.266-10.001 8.516 0 16.256 3.32 21.998 8.736 12.784 12.145 13.36 32.434 1.264 45.233l-251.52 265.6c-5.844 6.155-14.086 9.984-23.223 9.984-0.025 0-0.051 0-0.076 0z"
p-id="1620"></path>
</svg></span></span></div>
</div>
</div>
<div class="gt-header"><a class="gt-avatar-github"><span class="gt-ico gt-ico-github"><span class="gt-svg"><svg viewBox="0 0 1024 1024" version="1.1" xmlns="http://www.w3.org/2000/svg">
<path d="M64 524C64 719.602 189.356 885.926 364.113 947.017 387.65799 953 384 936.115 384 924.767L384 847.107C248.118 863.007 242.674 773.052 233.5 758.001 215 726.501 171.5 718.501 184.5 703.501 215.5 687.501 247 707.501 283.5 761.501 309.956 800.642 361.366 794.075 387.658 787.497 393.403 763.997 405.637 743.042 422.353 726.638 281.774 701.609 223 615.67 223 513.5 223 464.053 239.322 418.406 271.465 381.627 251.142 320.928 273.421 269.19 276.337 261.415 334.458 256.131 394.888 302.993 399.549 306.685 432.663 297.835 470.341 293 512.5 293 554.924 293 592.81 297.896 626.075 306.853 637.426 298.219 693.46 258.054 747.5 262.966 750.382 270.652 772.185 321.292 753.058 381.083 785.516 417.956 802 463.809 802 513.5 802 615.874 742.99 701.953 601.803 726.786 625.381 750.003 640 782.295 640 818.008L640 930.653C640.752 939.626 640 948.664978 655.086 948.665 832.344 888.962 960 721.389 960 524 960 276.576 759.424 76 512 76 264.577 76 64 276.576 64 524Z"></path>
</svg>
</span></span></a>
<div class="gt-header-comment"><textarea class="gt-header-textarea " placeholder="Leave a comment" style="overflow: hidden; overflow-wrap: break-word; resize: none; height: 72px;"></textarea>
<div class="gt-header-preview markdown-body hide"></div>
<div class="gt-header-controls"><a class="gt-header-controls-tip" href="https://guides.github.com/features/mastering-markdown/" target="_blank" rel="noopener noreferrer"><span class="gt-ico gt-ico-tip"><span class="gt-svg"><svg viewBox="0 0 1024 1024" version="1.1" xmlns="http://www.w3.org/2000/svg">
<path d="M512 366.949535c-16.065554 0-29.982212 13.405016-29.982212 29.879884l0 359.070251c0 16.167882 13.405016 29.879884 29.982212 29.879884 15.963226 0 29.879884-13.405016 29.879884-29.879884L541.879884 396.829419C541.879884 380.763865 528.474868 366.949535 512 366.949535L512 366.949535z" p-id="3083"></path>
<path d="M482.017788 287.645048c0-7.776956 3.274508-15.553912 8.80024-21.181973 5.525732-5.525732 13.302688-8.80024 21.181973-8.80024 7.776956 0 15.553912 3.274508 21.079644 8.80024 5.525732 5.62806 8.80024 13.405016 8.80024 21.181973 0 7.776956-3.274508 15.656241-8.80024 21.181973-5.525732 5.525732-13.405016 8.697911-21.079644 8.697911-7.879285 0-15.656241-3.274508-21.181973-8.697911C485.292295 303.301289 482.017788 295.524333 482.017788 287.645048L482.017788 287.645048z" p-id="3084"></path>
<path d="M512 946.844409c-239.8577 0-434.895573-195.037873-434.895573-434.895573 0-239.8577 195.037873-434.895573 434.895573-434.895573 239.755371 0 434.895573 195.037873 434.895573 434.895573C946.895573 751.806535 751.755371 946.844409 512 946.844409zM512 126.17088c-212.740682 0-385.880284 173.037274-385.880284 385.777955 0 212.740682 173.037274 385.777955 385.880284 385.777955 212.740682 0 385.777955-173.037274 385.777955-385.777955C897.777955 299.208154 724.740682 126.17088 512 126.17088z" p-id="3085"></path>
</svg>
</span><span class="gt-ico-text">Markdown is supported</span></span></a><button class="gt-btn gt-btn-preview"><span class="gt-btn-text">Preview</span></button><button class="gt-btn gt-btn-login"><span class="gt-btn-text">Login with
GitHub</span></button></div>
</div>
</div>
<div class="gt-comments">
<div style="position: relative;">
<div class="gt-comment gt-comment-admin" style="transform-origin: center top;">
<div class="gt-avatar gt-comment-avatar"><img src="https://avatars.githubusercontent.com/u/13835420?v=4" alt="@40huo"></div>
<div class="gt-comment-content">
<div class="gt-comment-header">
<div class="gt-comment-block-1"></div><a class="gt-comment-username" href="https://github.com/40huo">40huo</a><span class="gt-comment-text">commented</span><span class="gt-comment-date">over 5 years ago</span><a class="gt-comment-like" title="Like"><span class="gt-ico gt-ico-heart"><span class="gt-svg"><svg viewBox="0 0 1024 1024" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
<path d="M527.061333 166.528A277.333333 277.333333 0 0 1 1000.618667 362.666667a277.333333 277.333333 0 0 1-81.28 196.138666l-377.173334 377.173334a42.666667 42.666667 0 0 1-60.330666 0l-377.173334-377.173334a277.376 277.376 0 0 1 392.277334-392.277333l15.061333 15.061333 15.061333-15.061333z m286.72 377.173333l45.226667-45.226666a192 192 0 0 0-135.808-327.893334 192 192 0 0 0-135.808 56.32l-45.226667 45.226667a42.666667 42.666667 0 0 1-60.330666 0l-45.226667-45.226667a192.042667 192.042667 0 0 0-271.616 271.573334L512 845.482667l301.781333-301.781334z"></path>
</svg>
</span></span></a><a class="gt-comment-reply" title="Reply"><span class="gt-ico gt-ico-reply"><span class="gt-svg"><svg viewBox="0 0 1332 1024" version="1.1" xmlns="http://www.w3.org/2000/svg">
<path d="M529.066665 273.066666 529.066665 0 51.2 477.866666 529.066665 955.733335 529.066665 675.84C870.4 675.84 1109.333335 785.066665 1280 1024 1211.733335 682.666665 1006.933335 341.333334 529.066665 273.066666"></path>
</svg>
</span></span></a>
</div>
<div class="gt-comment-body markdown-body">
<p dir="auto">测试123</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</form>
Text Content
Skip to content CTF Wiki EN Getting Started Initializing search mahaloz/ctf-wiki-en * 64 * 16 * Introduction * Misc * Crypto * Web * Assembly * Executable * Reverse Engineering * Pwn * Android * ICS CTF Wiki EN mahaloz/ctf-wiki-en * 64 * 16 * Introduction Introduction * Getting Started Getting Started Table of contents * How to build? * How to practice? * CTF History * CTF Competition Types * CTF Competition Topics * Attack and Defense Experience Summary * Learning Resources * Misc Misc * Miscellaneous Introduction * Information Gathering Method * Encoding Analysis Encoding Analysis * Encoding Used in Communication * Encoding Used in Computing * Encoding Used in the Real World * Forensic and Steganography Prerequisite * Image Analysis Image Analysis * Introduction to Image Analysis * PNG * JPG * GIF * Audio Steganography * Traffic Packet Analysis Traffic Packet Analysis * Introduction to Traffic Packet Analysis * PCAP File Repairing * Protocol Analysis Protocol Analysis * Overview of Protocol Analysis * Wireshark * HTTP * HTTPS * FTP * DNS * WIFI * USB * Data Extraction * Compressed Package Analysis Compressed Package Analysis * ZIP Format * RAR Format * Disk and Memory Analysis Disk and Memory Analysis * Introduction * Crypto Crypto * Introduction to Cryptography * Basic Mathematics Basic Mathematics * Introduction * Classical Cipher Classical Cipher * Introduction to Classical Cryptography * Single table Substitution Cipher * Multi-table Substitution Cipher * Other Types of Cipher * Summary * Stream Cipher Stream Cipher * Introduction * Pseudo Random Number Generator Pseudo Random Number Generator * Introduction * Cryptographic Security Pseudo-random Number Generator * Challenge Examples * Linear Congruence Generator Linear Congruence Generator * Introduction * Example * Feedback Shift Register Feedback Shift Register * Introduction * Linear Feedback Shift Register * Nonlinear Feedback Shift Register * Special Stream Cipher Special Stream Cipher * RC4 * Block Cipher Block Cipher * Introduction to Block Cipher * ARX * DES * IDEA * AES * Simon and Speck * Group Mode Group Mode * Introduction * Padding Methods * ECB * CBC * PCBC * CFB * OFB * CTR * Padding Oracle Attack * Asymmetric Cryptography Asymmetric Cryptography * Introduction to Asymmetric Cryptography * RSA RSA * RSA Introduction * Modulo-related Attacks * Public Key Index Related Attacks * Private Key d Related Attacks * Coppersmith Related Attacks * Chosen Plain Cipher Attack * Side Channel Attack * Bleichenbacher Attack * Challenge Examples * Knapsack Cipher * Discrete Log Correlation Discrete Log Correlation * Discrete Logarithm * Elgamal * ECC * Lattice-based Cryptography Lattice-based Cryptography * Lattice Overview * Introduction to Lattices * Lattice-based Algorithm * CVP * Hash Function Hash Function * Introduction to the Hash Function * MD5 * SHA1 * FNV * Hash Attack * Challenge Examples * Digital Signature Digital Signature * Introduction to Digital Signatures * RSA Digital Signature * ElGamal Digital Signature * DSA Digital Signature * Summary of Attack Techniques Summary of Attack Techniques * Introduction * Man in the Middle Attack * Bit attack * Certificate Format * Web Web * Introduction to Web Applications * SQL Injection * XSS Cross-Site Scripting * CSRF Cross-Site Request Forgery * SSRF Server Request Forgery * PHP Code Auditing * Assembly Assembly * x86_x64 * mips * arm * Executable Executable * ELF file ELF file * ELF File Basic Structure * Program Loading * Program Link * Program Execution Flow * PE file PE file * PE File Basic Structure * PE Import Table * PE Export Table * PE Relocation Table * Reverse Engineering Reverse Engineering * Reverse Overview Reverse Overview * Software Reverse Engineering Introduction * Common Encryption Algorithms and Code Recognition * Labyrinth Problem * Virtual Machine Command Analysis * Unicorn Engine Introduction * Linux Reverse Linux Reverse * Linux Reverse Technology Linux Reverse Technology * LD_PRELOAD * Incorrect Disassembly Fix * Detecting Breakpoints Bypassing * Detecting Debugging Bypassing * Windows Reverse Windows Reverse * Shelling Technique Shelling Technique * Introduction to the Protective case * Single Step Tracking Method * ESP Law * One Step to the OEP Method * Memory Mirroring Method * Last Exception Method * SFX Method * DUMP and IAT Reconstruction * Manually Find the IAT and Rebuild It Using ImportREC * DLL File Unpacking * Anti-debugging Technique Anti-debugging Technique * NtGlobalFlag * Heap Flags * The Heap * Interrupt 3 * IsDebuggerPresent * CheckRemoteDebuggerPresent * NtQueryInformationProcess * ZwSetInformationThread * Flower command * Anti-debug Technical Example * Pwn Pwn * Pwn Overview Pwn Overview * Readme * Linux Pwn Linux Pwn * Security Protection Mechanism Security Protection Mechanism * Canary * Stack Overflow Stack Overflow * Stack Introduction * Stack Overflow Principle * Basic ROP * Intermediate ROP * Advanced ROP * ROP Tricks * Format String Vulnerability Format String Vulnerability * Format String Vulnerability Principle * Format String Exploit * Format String Vulnerability Example * Format String Vulnerability Detection * Glibc Heap Related Glibc Heap Related * Introduction to Heap * Heap Overview * Heap Related Data Structure * In-depth Explanation of Ptmalloc2 In-depth Explanation of Ptmalloc2 * Implementation * Basic Functions in the heap implementation * Heap Initialization * Allocate Heap Memory * Free Heap Memory * Tcache * malloc_state * Other * Heap Overflow * Heap-based Off-By-One * Chunk Extend/Overlapping * Unlink * Use After Free * Fastbin Attack * Unsorted Bin Attack * Large Bin Attack * Tcache Attack * House of Einherjar * House of Force * House of Lore * House of Orange * House of Rabbit * House of Roman * IO_FILE Related IO_FILE Related * FILE Structure Description * Forged Vtable to Hijack Control Flow * FSOP * Use of IO_FILE Under Glibc 2.24 * Race Condition Race Condition * Race Condition Introduction * Example * Integer Overflow Integer Overflow * Introduction to The Principle of Integer Overflow * Sandbox Escape Sandbox Escape * Python Sandbox Escape * Linux Kernel Linux Kernel * Environment Setup * Basics * Kernel-UAF * Kernel-ROP * ret2usr * bypass-smep * Double Fetch * arm-pwn arm-pwn * Environment Setup * arm-rop * Summary Summary * Address Leaking * Hijack Control Flow * Get Shell * Windows Pwn Windows Pwn * Overview * Stack Overflow Stack Overflow * Stack Introduction * Stack Overflow Basics * shellcode-in-stack * Android Android * Android Development Basics * Android Application Operating Mechanism Brief Android Application Operating Mechanism Brief * Basics * The Operating Mechanism of the Java Layer in Android The Operating Mechanism of the Java Layer in Android * Andriod Native * Smali Introduction * Dex and ODEX Dex and ODEX * DEX * ODEX * Android Native Layer Introduction Android Native Layer Introduction * Android Shared Object * Android Reverse Basic Introduction Android Reverse Basic Introduction * Brief Overview * Android Key Part Location * Android Simple Static Analysis Android Simple Static Analysis * Android Java Layer Static Analysis * Android Native Layer Static Analysis * Android Static Analysis Hybrid Example * Android Simple Dynamic Analysis Android Simple Dynamic Analysis * Dynamic Debugging * Android Dynamic Debugging SO * ICS ICS * ICS_CTF Contest * ICS_CTF Discovery * ICS_CTF Exploit * ICS_CTF Learning Resources Table of contents * How to build? * How to practice? GETTING STARTED Welcome to the CTF Wiki. CTF (Capture The Flag) is originated in the 1996 DEFCON Global Hacking Conference, a competitive game among cybersecurity enthusiasts. The CTF competition covers a wide range of fields and has a complex content. At the same time, the development of security technology is getting faster and faster, and the difficulty of CTF is getting higher and higher, the threshold for beginners is getting higher and higher. Most of the online information is scattered and trivial. Beginners often don't know how to systematically learn the knowledge of CTF related fields, often taking a lot of time and suffering. In order to make the CTF players life of entering this field easier, in October 2016, CTF Wiki had the first commit on Github. As content continues to improve, the CTF Wiki has been loved by more and more security enthusiasts, and there are also a lot of friends who have never met participating in this project. As a free site, with the recent years' CTF challenges, CTF Wiki introduces the knowledge and techniques in all directions of CTF to make it easier for beginners to learn how to getting started at playing CTF. At present, CTF Wiki mainly contains the basic knowledge of CTF in all major directions, and is working hard to improve the following contents. * Advanced knowledge in the CTF competition * Quality topics in the CTF competition For more information on the above, see the [Projects] (https://github.com/ctf-wiki/ctf-wiki/projects) of the CTF Wiki for a detailed list of what is being done and what to do. Of course, the CTF Wiki is based on CTF, but it is not limited to CTF. In the future, CTF Wiki will * Introducing tools in security research area * More integration with security area In addition, given the following two points * Technology should be shared in an open manner. * Security offensive and defensive technologies are always up to date, and old technologies may fail at any time in the face of new technologies. CTF Wiki will never publish books. Finally, the CTF Wiki originates from the community, as an independent organization, advocates freedom of knowledge, will never be commercialized in the future, and will always remain independent and freedom**. HOW TO BUILD?¶ This document is currently deployed at [https://ctf-wiki.github.io/ctf-wiki/] (https://ctf-wiki.github) using mkdocs .io/ctf-wiki/). Of course, it can also be deployed locally, as follows: # 1. clone git clone git@github.com: ctf-wiki / ctf-wiki.git # 2. requirements pip install -r requirements.txt # generate static file in site/ mkdocs build # deploy at http://127.0.0.1:8000 mkdocs serve mkdocs Locally deployed websites are dynamically updated, i.e. when you modify and save the md file, refreshing the page and the contents will be dynamically updated. Just want to browse locally, don't want to modify the document? Try Docker! docker run -d --name=ctf-wiki -p 4100:80 ctfwiki/ctf-wiki You can then access the CTF Wiki by visiting [http://localhost:4100/] (http://localhost:4100/) in your browser. HOW TO PRACTICE?¶ First, you can learn some basic security knowledge by reading online. Second, the CTF Wiki has two accompany projects. * The challenges mentioned in the CTF Wiki are in the [ctf-challenges] (https://github.com/ctf-wiki/ctf-challenges) repository, so look for them according to the corresponding category. * Note: There are still some challenges that are currently being migrated. . . (misc, web) * The tools involved in the CTF Wiki are constantly being added to the ctf-tools repository. -------------------------------------------------------------------------------- > 本页面的全部内容在 CC BY-NC-SA 4.0 协议之条款下提供,附加条款亦可能应用。 COMMENTS 1 comment Anonymous Markdown is supportedPreviewLogin with GitHub 40huocommentedover 5 years ago 测试123 Next CTF History Copyright © 2021 mahaloz Made with Material for MkDocs