Pwn 就是要你去破億出遠端機器的漏洞然後打下來獲取Flag。(這種題目我超爛:( )
WP完成度: (0/10)
Pwn分類:
-ASCII Driver (100)

題目:
Author: zKltch
Download Flie
Connectionnc chal.thjcc.org 10022
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-Farm (100)

題目:
Author: zKltch
Download Flie
Connectionnc chal.thjcc.org 10020
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-login as admin (410)

題目:
I think I made a very secure login system, so no one can hack it
Author: Auron
Download Flie
Connectionnc chal.thjcc.org 10003
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-MyGO!!!!! Database revenge (415)

題目:
Author: zKltch
Download Flie
Connectionnc chal.thjcc.org 10021
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-Secret Intern Service (426)

題目:
Exploit the “unexploitable” service and prove you’re truly the best of the best.
This challenge depends on Secret File Viewer, find something useful for you right there
Author: Grissia
Download Flie
Connectionnc chal.thjcc.org 30001
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-Baby PHP (463)

題目:
This is a baby web challenge.
:>
Note: ASLR is 0
http://chal-gcp.thjcc.org:60000/
Author: whale120
Download Flie
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-Excalipipe (476)

題目:
問おう。あなたがわたしのマスターか?
(Please solve this challenge locally before connecting to the remote server.)
Notice:
- The main files to focus on for this challenge are located in the src/challenge/ directory.
- When you connect to the server, it will require solving a PoW. The PoW solver script is located at solver/solve_pow.py.
- After solving PoW, the server will ask if you want to upload your exploit — provide the URL of your exploit file to do so.
- When QEMU startup, you can find your exploit at /tmp/e.
- If you have any problem about linux kernel challenge environment, please refer to the challenge others source code.
Author: naup96321
Download Flie
Connectionnc chal-gcp.thjcc.org 13371
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-Happy Cat Jail (494)

題目:
meow ?
Author: Frank
Download Flie
Connectionnc chal.thjcc.org 9000
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-僕と契約して、魔法少女になってよ! (500)

題目:
Do you like QB?! ~ ☆.
(Please solve this challenge locally before connecting to the remote server.)
Notice:
- The main files to focus on for this challenge are located in the src/challenge/ directory.
- When you connect to the server, it will require solving a PoW. The PoW solver script is located at solver/solve_pow.py.
- After solving PoW, the server will ask if you want to upload your exploit — provide the URL of your exploit file to do so.
- When QEMU startup, you can find your exploit at /tmp/e.
- If you have any problem about linux kernel challenge environment, please refer to the challenge others source code.
Author: naup96321
Download Flie
Connectionnc chal-gcp.thjcc.org 13370
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}
-THJCC file upload server (500)

題目:
here we go absolutely insane.
Author: zKltch
Download Flie
解題心得:
好吧這題其實沒有解出來,還在學習中,等學好了再放上來!
Flag:
THJCC{}