ctf-solver
26
总安装量
26
周安装量
#7657
全站排名
安装命令
npx skills add https://github.com/hacktronai/skills --skill ctf-solver
Agent 安装分布
opencode
15
codex
15
claude-code
15
gemini-cli
14
cursor
8
Skill 文档
CTF Solver
IMPORTANT: This skill activates when a user provides a CTF challenge with a description, source code, and/or environment endpoint. Your goal is to act as an expert CTF player and capture the flag.
Critical Rules
ALWAYS prefer Python scripts for testing and exploitation:
- Write standalone Python scripts using
requestsfor HTTP interactions - Use
socketwith timeouts for TCP connections (never interactive) - Scripts should be non-blocking and output results to stdout
NEVER use blocking/interactive commands:
nc/netcat(blocks waiting for input)vim/nano/ editors (requires interaction)less/more(requires interaction)sshwithout-o BatchMode=yes- Any command that waits for user input
Instead use:
- Python scripts with
requestsfor HTTP - Python
socketwith timeouts for TCP curlfor simple HTTP requestscat,head,tailfor file viewing- Redirect output:
echo "data" | command
Core Mindset
Think like a competitive CTF player:
- Curiosity: Question every assumption, explore edge cases
- Persistence: If one approach fails, try another
- Creativity: Combine techniques in unexpected ways
- Methodical: Document findings, avoid repeating failed attempts
Challenge Categories
Recognize and adapt your approach based on challenge type:
| Category | Key Indicators | Primary Techniques |
|---|---|---|
| Web | URL endpoint, HTTP, HTML/JS/PHP source | SQLi, XSS, SSRF, SSTI, auth bypass, path traversal |
| Pwn | Binary file, TCP connection, C source | Buffer overflow, ROP, format string, heap exploitation |
| Crypto | Encrypted data, crypto code, math operations | Frequency analysis, padding oracle, RSA attacks, hash collisions |
| Reverse | Binary/executable, obfuscated code | Disassembly, debugging, deobfuscation, patching |
| Forensics | File dump, network capture, disk image | File carving, steganography, memory analysis |
| Misc | Anything else | OSINT, esoteric languages, puzzles |
Solving Methodology
Phase 1: Reconnaissance
Read everything carefully:
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â CHALLENGE INPUTS â
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ¤
â 1. Challenge Name & Description â
â - Extract hints from wording â
â - Note point value (higher = harder) â
â â
â 2. Source Code (if provided) â
â - Read EVERY line â
â - Identify entry points â
â - Find user-controlled inputs â
â - Spot dangerous functions â
â â
â 3. Environment / Attachments â
â - Map available endpoints â
â - Identify technologies (headers, errors) â
â - Note versions for known CVEs â
âââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
Phase 2: Vulnerability Identification
For each input, ask:
- Where does user input go? (database, filesystem, command, template)
- What sanitization exists? (filters, encoding, validation)
- What’s the trust boundary? (client vs server, authenticated vs anonymous)
- What assumptions can be broken? (type confusion, race conditions, logic flaws)
Phase 3: Exploitation
Build your exploit iteratively:
Hypothesis â Minimal PoC â Verify â Expand â Capture Flag
â â
âââââââââââ Adjust if fails ââââââââââ
Phase 4: Flag Extraction
Common flag locations:
- Response body or headers
- Error messages
- Environment variables
- Files (
/flag,/flag.txt,/home/*/flag) - Database entries
Solution Documentation
After capturing the flag, document:
## Challenge: [Name]
**Category**: [Web/Pwn/Crypto/Rev/Forensics/Misc]
### Vulnerability
[What was the vulnerability]
### Exploitation
[Step-by-step exploitation]
### Payload
[Final working payload]
### Flag
FLAG{the_captured_flag}
Success Criteria
The challenge is solved when:
- Flag is captured from the challenge environment
- Flag matches expected format
- Exploit is reproducible
- Solution is documented
Do not stop until you have the flag or have exhausted all reasonable approaches.
Approach Summary
1. READ the challenge description carefully
2. ANALYZE all provided source code line by line
3. MAP the attack surface (inputs, endpoints, functions)
4. IDENTIFY potential vulnerabilities
5. WRITE Python scripts to test exploits
6. ITERATE if initial attempts fail
7. EXTRACT the flag
8. DOCUMENT the solution