730 字
4 分鐘
THJCC 2026 CTF Writeup 6 - Pwn
2026-02-23
2026-03-01

Pwn 就是要你去破億出遠端機器的漏洞然後打下來獲取Flag。(這種題目我超爛:( )

WP完成度: (0/10)

Pwn分類:#

-ASCII Driver (100)#

題目圖片

題目:#

Author: zKltch

Download Flie

ASCII_Driver.zip

Connection

nc chal.thjcc.org 10022

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-Farm (100)#

題目圖片

題目:#

Author: zKltch

Download Flie

Farm.zip

Connection

nc chal.thjcc.org 10020

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-login as admin (410)#

題目圖片

題目:#

I think I made a very secure login system, so no one can hack it

Author: Auron

Download Flie

chal (2).zip

Connection

nc chal.thjcc.org 10003

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-MyGO!!!!! Database revenge (415)#

題目圖片

題目:#

Author: zKltch

Download Flie

mygo_database_revenge.zip

Connection

nc chal.thjcc.org 10021

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-Secret Intern Service (426)#

題目圖片

題目:#

Exploit the “unexploitable” service and prove you’re truly the best of the best.

This challenge depends on Secret File Viewer, find something useful for you right there

Author: Grissia

Download Flie

chal.c

Connection

nc chal.thjcc.org 30001

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-Baby PHP (463)#

題目圖片

題目:#

This is a baby web challenge.
:>

Note: ASLR is 0

http://chal-gcp.thjcc.org:60000/

Author: whale120

Download Flie

baby-php-release.zip

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-Excalipipe (476)#

題目圖片

題目:#

問おう。あなたがわたしのマスターか?

(Please solve this challenge locally before connecting to the remote server.)
Notice:

  • The main files to focus on for this challenge are located in the src/challenge/ directory.
  • When you connect to the server, it will require solving a PoW. The PoW solver script is located at solver/solve_pow.py.
  • After solving PoW, the server will ask if you want to upload your exploit — provide the URL of your exploit file to do so.
  • When QEMU startup, you can find your exploit at /tmp/e.
  • If you have any problem about linux kernel challenge environment, please refer to the challenge others source code.

Author: naup96321

Download Flie

dist_excalipipe.zip

Connection

nc chal-gcp.thjcc.org 13371

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-Happy Cat Jail (494)#

題目圖片

題目:#

meow ?

Author: Frank

Download Flie

THJCC_Happy-Cat-Jail.go

Connection

nc chal.thjcc.org 9000

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-僕と契約して、魔法少女になってよ! (500)#

題目圖片

題目:#

Do you like QB?! ~ ☆.

(Please solve this challenge locally before connecting to the remote server.)
Notice:

  • The main files to focus on for this challenge are located in the src/challenge/ directory.
  • When you connect to the server, it will require solving a PoW. The PoW solver script is located at solver/solve_pow.py.
  • After solving PoW, the server will ask if you want to upload your exploit — provide the URL of your exploit file to do so.
  • When QEMU startup, you can find your exploit at /tmp/e.
  • If you have any problem about linux kernel challenge environment, please refer to the challenge others source code.

Author: naup96321

Download Flie

dist_qb.zip

Connection

nc chal-gcp.thjcc.org 13370

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

-THJCC file upload server (500)#

題目圖片

題目:#

here we go absolutely insane.

http://chal.thjcc.org:10100

Author: zKltch

Download Flie

THJCC_file_upload_system.zip

解題心得:#

好吧這題其實沒有解出來,還在學習中,等學好了再放上來!

Flag:#

THJCC{}

THJCC 2026 CTF Writeup 6 - Pwn
https://pg72.tw/posts/thjcc-2026-writeup/6/
作者
PGpenguin72
發佈於
2026-02-23
許可協議
CC BY-NC-SA 4.0
留言區