https://exp10it.io/2024/02/n1ctf-junior-2024-web-official-writeup/

https://github.com/hash-hash/ctf/tree/main/my-ctf-challenge/n1junior2024

Pwn:

LiesofP:

Old wine in a new bottle.

Hint:
1.附件里面有源码,漏洞是数组越界读写

LiesofP.zip

File Manager:

File Manager

File Manager.zip

RingofM:

Patience is the best remedy for every trouble.

Hint:
1.漏洞为格式化字符串

RingofM.zip

朝闻道:

读取/flag的内容,请先阅读hint.txt

Hint:
1.思考为什么open的路径必须以'/'开头?如果没有这个限制,题目怎么做。[<https://docs.kernel.org/filesystems/proc.html>](<https://docs.kernel.org/filesystems/proc.html>)
2.如果没有open路径必须为绝对路径的限制,可通过以下操作解题:cd /work; 创建特殊文件,名为bin,读取其内容时是/flag的内容;打开"./bin"并读取。
父进程检查路径为"./bin",对应到根目录的"/bin",inode号和/flag不同,子进程实际打开路径为"./bin",对应"/work/bin",打开了flag

朝闻道.zip