Skip to content

Commit 69bd310

Browse files
committed
docs: fix typo
1 parent 3458676 commit 69bd310

File tree

15 files changed

+32
-29
lines changed

15 files changed

+32
-29
lines changed

docs/wp/2024/author-list.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444
{ "name": "这是几次方?疑惑!", "category": "Crypto", "author": "saga131" },
4545
{ "name": "Since you konw something", "category": "Crypto", "author": "Zechariah" },
4646
{ "name": "茶里茶气", "category": "Crypto", "author": "coperlm" },
47-
{ "name": "just one and more than two", "category": "Crypto", "author": "Zechariah" },
47+
{ "name": "Just one and more than two", "category": "Crypto", "author": "Zechariah" },
4848
{ "name": "用溯流仪见证伏特台风", "category": "Misc", "author": "Zechariah" },
4949
{ "name": "你也玩原神吗", "category": "Misc", "author": "Findkey" },
5050
{ "name": "字里行间的秘密", "category": "Misc", "author": "Red Orange" },

docs/wp/2024/week1/misc/decompress.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ titleTemplate: ':title | WriteUp - NewStar CTF 2024'
1414

1515
与校内赛道相比,多了一步爆破压缩包密码的过程。
1616

17-
根据给的正则表达式提示,密码是三位小写字母一位数字再加一位小写字母,共五位。爆破出来是 `xtr4m`
17+
根据给的正则表达式提示,密码是三位小写字母一位数字再加一位小写字母,共五位。爆破出来是 `xtr4m`.
1818

1919
出题人使用的是不知道从哪下载的 passware,爆破了两分钟就出来了。
2020

docs/wp/2024/week1/misc/pleasingmusic.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ titleTemplate: ':title | WriteUp - NewStar CTF 2024'
1111
根据提示<span data-desc>(其实也能听出来后半段音乐是倒放出来的)</span>将音频进行反向处理实现**倒放**,再解析其中的摩斯电码(Morse Code)。
1212

1313
![界面 1](/assets/images/wp/2024/week1/pleasingmusic_1.png)
14+
1415
![界面 2](/assets/images/wp/2024/week1/pleasingmusic_2.png)
1516

1617
可以手动翻译摩斯电码表,也可以使用[在线解码](https://www.lddgo.net/encrypt/morse)

docs/wp/2024/week1/reverse/ezandroidstudy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,4 +44,4 @@ IDA64 打开 `lib/x86_64/libezandroidstudy.so`,找到以 Java 开始的函数
4444

4545
![旁白酱可爱捏嘿嘿(~o ̄3 ̄)~](/assets/images/wp/2024/week1/ezandroidstudy_5.png)
4646

47-
Ans: `flag{Y0u_@r4_900d_andr01d_r4V4rs4r}`
47+
**Ans:** `flag{Y0u_@r4_900d_andr01d_r4V4rs4r}`

docs/wp/2024/week1/web/zhixieweiji.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ else {
4646

4747
一个对新生来说略绕的 PHP 代码阅读,也对编写脚本、使用 WebShell 的能力进行初步的考查。
4848

49-
`cmd` 参数是**Base64 编码后**`system` 命令。
49+
`cmd` 参数是 **Base64 编码后**`system` 命令。
5050

5151
`key` 的验证逻辑:将<strong>`cmd` 参数值</strong>字符串翻转后,计算 MD5 哈希,并与 Base64 解码后的 `key` 进行比较。
5252

docs/wp/2024/week2/crypto/just-one-and-more-than-two.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
titleTemplate: ':title | WriteUp - NewStar CTF 2024'
33
---
44

5-
# just one and more than two
5+
# Just one and more than two
66

77
很常见的 RSA 板子题。在一般的 RSA 中,我们有
88

docs/wp/2024/week2/misc/wireshark-checkin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ import SVGTCPFin from '@docs/assets/images/wp/2024/TCP_fin.svg?component'
1212

1313
![快速找主要部分](/assets/images/wp/2024/week2/wireshark_checkin_1.png)
1414

15-
标绿色的是http协议相关的,鼠标左键点击 `GET /reverse.c` 这个条目,看 Wireshark 界面左下角,写着一个 `Port: 7070`,这个是 HTTP 服务器的开放端口。
15+
标绿色的是 HTTP 协议相关的,鼠标左键点击 `GET /reverse.c` 这个条目,看 Wireshark 界面左下角,写着一个 `Port: 7070`,这个是 HTTP 服务器的开放端口。
1616

1717
![找到 HTTP 服务器的端口](/assets/images/wp/2024/week2/wireshark_checkin_2.png)
1818

docs/wp/2024/week2/misc/xiaoming1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ import Container from '@/components/docs/Container.vue'
1616

1717
题目简介:
1818

19-
>小明的邻居小红忘记了电脑的登录密码,好像设置的还挺复杂的,现在小红手里只有一个内存镜像(为什么她会有这个?),小明为了帮助邻居就找到了精通电脑的你……
19+
> 小明的邻居小红忘记了电脑的登录密码,好像设置的还挺复杂的,现在小红手里只有一个内存镜像(为什么她会有这个?),小明为了帮助邻居就找到了精通电脑的你……
2020
2121
拿到手的是一个叫 `image.raw` 的文件,由题可知是内存镜像。
2222

docs/wp/2024/week2/pwn/my-gbc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
titleTemplate: ':title | WriteUp - NewStar CTF 2024'
33
---
44

5-
# My_GBC\!\!\!\!\!
5+
# My_GBC!!!!!
66

77
先将程序拖入 IDA 分析
88

docs/wp/2024/week2/reverse/drink_tea.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,17 @@ titleTemplate: ':title | WriteUp - NewStar CTF 2024'
2222
#include <stdio.h>
2323
#include <stdint.h>
2424

25-
//解密函数
25+
// 解密函数
2626
void decrypt (uint32_t* v, uint32_t* k) {
27-
uint32_t v0 = v[0], v1 = v[1], i;
28-
uint32_t delta = 2654435769;
29-
uint32_t sum = (32)*delta;
30-
uint32_t k0 = k[0], k1 = k[1], k2 = k[2], k3 = k[3];
31-
for (i = 0; i < 32; i++) { // 解密时将加密算法的顺序倒过来,+= 变为 -=
27+
uint32_t v0 = v[0], v1 = v[1], i;
28+
uint32_t delta = 2654435769;
29+
uint32_t sum = (32)*delta;
30+
uint32_t k0 = k[0], k1 = k[1], k2 = k[2], k3 = k[3];
31+
for (i = 0; i < 32; i++) { // 解密时将加密算法的顺序倒过来,+= 变为 -=
3232
v1 -= ((v0 << 4) + k2) ^ (v0 + sum) ^ ((v0>>5) + k3);
3333
v0 -= ((v1 << 4) + k0) ^ (v1 + sum) ^ ((v1>>5) + k1);
3434
sum -= delta;
35-
}
35+
}
3636
v[0] = v0; v[1] = v1; // 解密后再重新赋值
3737
}
3838

0 commit comments

Comments
 (0)