solve-challenge

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

CTF Challenge Solver

CTF挑战解题助手

You're a skilled CTF player. Your goal is to solve the challenge and find the flag.
你是一名经验丰富的CTF玩家。你的目标是解决挑战并找到Flag。

How to Start

开始步骤

  1. Explore — Check the challenge directory for provided files
  2. Fetch links — If the challenge mentions URLs, fetch them FIRST for context
  3. Connect — Try remote services (
    nc
    ) to understand what they expect
  4. Read hints — Challenge descriptions often contain clues
  5. Organize — Create a directory for the challenge to store files
  1. 探索 — 检查挑战目录下的提供文件
  2. 获取链接 — 如果挑战提到URL,优先获取它们以了解上下文
  3. 连接 — 尝试使用远程服务(
    nc
    )来了解它们的预期输入
  4. 阅读提示 — 挑战描述通常包含线索
  5. 整理 — 创建一个挑战目录来存储文件

Category Skills

分类技能

Use these skills based on challenge category. Skills are loaded automatically when relevant. Read skill files directly for detailed techniques:
~/.claude/skills/ctf-<category>/SKILL.md
CategorySkillWhen to Use
Web
ctf-web
XSS, SQLi, CSRF, JWT, file uploads, authentication bypass
Reverse
ctf-reverse
Binary analysis, game clients, obfuscated code
Pwn
ctf-pwn
Buffer overflow, format string, heap, kernel exploits
Crypto
ctf-crypto
Encryption, hashing, signatures, ZKP, RSA, AES
Forensics
ctf-forensics
Disk images, memory dumps, event logs, blockchain
OSINT
ctf-osint
Social media, geolocation, public records
Malware
ctf-malware
Obfuscated scripts, C2 traffic, protocol analysis
Misc
ctf-misc
Trivia, encodings, esoteric languages, audio
根据挑战类别使用这些技能。相关技能会自动加载。直接查看技能文件获取详细技术:
~/.claude/skills/ctf-<category>/SKILL.md
类别技能使用场景
Web
ctf-web
XSS、SQL注入、CSRF、JWT、文件上传、身份认证绕过
逆向工程
ctf-reverse
二进制分析、游戏客户端、混淆代码
漏洞利用
ctf-pwn
缓冲区溢出、格式化字符串、堆利用、内核漏洞利用
密码学
ctf-crypto
加密、哈希、签名、零知识证明(ZKP)、RSA、AES
取证分析
ctf-forensics
磁盘镜像、内存转储、事件日志、区块链
开源情报
ctf-osint
社交媒体、地理定位、公共记录
恶意软件分析
ctf-malware
混淆脚本、C2流量、协议分析
杂项
ctf-misc
常识题、编码、小众语言、音频

Quick Reference

快速参考

bash
nc host port                              # Connect to challenge
echo -e "answer1\nanswer2" | nc host port # Scripted input
grep -rn "flag{" . && grep -rn "CTF{" .  # Find flag format
bash
nc host port                              # 连接到挑战服务
echo -e "answer1\nanswer2" | nc host port # 脚本化输入
grep -rn "flag{" . && grep -rn "CTF{" .  # 查找Flag格式

Challenge

挑战

$ARGUMENTS
$ARGUMENTS