https://exp10it.io/2024/02/n1ctf-junior-2024-web-official-writeup/
https://github.com/hash-hash/ctf/tree/main/my-ctf-challenge/n1junior2024
Old wine in a new bottle.
Hint:
1.附件里面有源码,漏洞是数组越界读写
File Manager
Patience is the best remedy for every trouble.
Hint:
1.漏洞为格式化字符串
读取/flag的内容,请先阅读hint.txt
Hint:
1.思考为什么open的路径必须以'/'开头?如果没有这个限制,题目怎么做。[<https://docs.kernel.org/filesystems/proc.html>](<https://docs.kernel.org/filesystems/proc.html>)
2.如果没有open路径必须为绝对路径的限制,可通过以下操作解题:cd /work; 创建特殊文件,名为bin,读取其内容时是/flag的内容;打开"./bin"并读取。
父进程检查路径为"./bin",对应到根目录的"/bin",inode号和/flag不同,子进程实际打开路径为"./bin",对应"/work/bin",打开了flag