To begin with, there is a very easy crypto chall. By solving it with collision, we can get:
key = "ASIS2020_W3bcrypt_ChAlLeNg3!@#%^"
Then, leverage this vuln (trentm/python-markdown2#348) to make /ticket
to have XSS.
import math | |
Cl2 = -914.539251 | |
Cl = -457.274191 | |
CH4 = -39.925088 | |
CH3 = -39.307514 | |
CH3Cl = -496.645171 | |
HCl = -457.859632 | |
CH2Cl2 = -953.354926 | |
CHCl3 = -1410.057976 | |
CCl4 = -1866.755609 |
# -*- coding:utf-8 -*- | |
############################################ | |
USERNAME = "YOUR_USERNAME" | |
PASSWORD = "YOUR_PASSWORD" | |
CHROME_DRIVER = "YOUR_PATH_TO_CHROME_DRIVER" | |
############################################ | |
from selenium.webdriver.common.keys import Keys | |
from selenium import webdriver | |
import time |
import smtplib | |
from email.mime.text import MIMEText | |
from email.header import Header | |
sender = '[email protected]' | |
receivers = ['[email protected]'] | |
message = MIMEText(""" | |
To whom it may concern, | |
Checking in again: did you receive my last email? |
#include <iostream> | |
#include <string> | |
#include <fstream> | |
using namespace std; | |
int main(int argc, char const *argv[]) | |
{ | |
if (argc == 1){ | |
cerr << "Usage: ./" << argv[0] << " filename" << endl; |
#include "cpp-httplib/httplib.h" | |
using namespace httplib; | |
int main() { | |
Server svr; | |
svr.Get("/1", [](const Request& req, Response& res) { | |
res.set_redirect("1\r\nSet-Cookie: a=1"); | |
}); | |
svr.Get("/2", [](const Request& req, Response& res) { | |
res.set_header("a", "1\r\nSet-Cookie: a=1"); | |
}); |
CREATE EVENT IF NOT EXISTS `calc_challenges_new_score` | |
ON SCHEDULE | |
EVERY 5 MINUTE | |
COMMENT 'Calculate points for challenges every 5 min' | |
DO | |
-- TBD |
-- Following CCC's algorithm | |
-- @base + ( @top - @base ) / (1 + (max(0, solves -1)/ 11.92201) ** 1.206069) | |
CREATE EVENT IF NOT EXISTS `calc_challenges_new_score` | |
ON SCHEDULE | |
EVERY 3 SECOND | |
COMMENT 'Calculate points for challenges' | |
DO | |
UPDATE challenges AS c SET c.`point` = CONVERT(c.base_point + (c.top_point - c.base_point) / (1 + POW(GREATEST(c.solved_count - 1, 0) / 11.92201, 1.206069)), UNSIGNED); | |
To begin with, there is a very easy crypto chall. By solving it with collision, we can get:
key = "ASIS2020_W3bcrypt_ChAlLeNg3!@#%^"
Then, leverage this vuln (trentm/python-markdown2#348) to make /ticket
to have XSS.
#include "DecodeCode.h" | |
mipsinstruction decode(int value) | |
{ | |
mipsinstruction instr; | |
unsigned int v = (unsigned int) value; | |
instr.funct = v & 0b111111; | |
instr.immediate = value & 0b1111111111111111; | |
unsigned short is_signed = instr.immediate >> 15; |