To begin with, there is a very easy crypto chall. By solving it with collision, we can get:
key = "ASIS2020_W3bcrypt_ChAlLeNg3!@#%^"
Then, leverage this vuln (trentm/python-markdown2#348) to make /ticket to have XSS.
| import math | |
| Cl2 = -914.539251 | |
| Cl = -457.274191 | |
| CH4 = -39.925088 | |
| CH3 = -39.307514 | |
| CH3Cl = -496.645171 | |
| HCl = -457.859632 | |
| CH2Cl2 = -953.354926 | |
| CHCl3 = -1410.057976 | |
| CCl4 = -1866.755609 |
| # -*- coding:utf-8 -*- | |
| ############################################ | |
| USERNAME = "YOUR_USERNAME" | |
| PASSWORD = "YOUR_PASSWORD" | |
| CHROME_DRIVER = "YOUR_PATH_TO_CHROME_DRIVER" | |
| ############################################ | |
| from selenium.webdriver.common.keys import Keys | |
| from selenium import webdriver | |
| import time |
| import smtplib | |
| from email.mime.text import MIMEText | |
| from email.header import Header | |
| sender = '[email protected]' | |
| receivers = ['[email protected]'] | |
| message = MIMEText(""" | |
| To whom it may concern, | |
| Checking in again: did you receive my last email? |
| #include <iostream> | |
| #include <string> | |
| #include <fstream> | |
| using namespace std; | |
| int main(int argc, char const *argv[]) | |
| { | |
| if (argc == 1){ | |
| cerr << "Usage: ./" << argv[0] << " filename" << endl; |
| #include "cpp-httplib/httplib.h" | |
| using namespace httplib; | |
| int main() { | |
| Server svr; | |
| svr.Get("/1", [](const Request& req, Response& res) { | |
| res.set_redirect("1\r\nSet-Cookie: a=1"); | |
| }); | |
| svr.Get("/2", [](const Request& req, Response& res) { | |
| res.set_header("a", "1\r\nSet-Cookie: a=1"); | |
| }); |
| CREATE EVENT IF NOT EXISTS `calc_challenges_new_score` | |
| ON SCHEDULE | |
| EVERY 5 MINUTE | |
| COMMENT 'Calculate points for challenges every 5 min' | |
| DO | |
| -- TBD |
| -- Following CCC's algorithm | |
| -- @base + ( @top - @base ) / (1 + (max(0, solves -1)/ 11.92201) ** 1.206069) | |
| CREATE EVENT IF NOT EXISTS `calc_challenges_new_score` | |
| ON SCHEDULE | |
| EVERY 3 SECOND | |
| COMMENT 'Calculate points for challenges' | |
| DO | |
| UPDATE challenges AS c SET c.`point` = CONVERT(c.base_point + (c.top_point - c.base_point) / (1 + POW(GREATEST(c.solved_count - 1, 0) / 11.92201, 1.206069)), UNSIGNED); | |
To begin with, there is a very easy crypto chall. By solving it with collision, we can get:
key = "ASIS2020_W3bcrypt_ChAlLeNg3!@#%^"
Then, leverage this vuln (trentm/python-markdown2#348) to make /ticket to have XSS.
| #include "DecodeCode.h" | |
| mipsinstruction decode(int value) | |
| { | |
| mipsinstruction instr; | |
| unsigned int v = (unsigned int) value; | |
| instr.funct = v & 0b111111; | |
| instr.immediate = value & 0b1111111111111111; | |
| unsigned short is_signed = instr.immediate >> 15; |