JUNZHEPAN.GITHUB.IO SERVER
We found that the main root page on junzhepan.github.io took seven hundred and sixty-six milliseconds to come up. Our web crawlers could not observe a SSL certificate, so in conclusion our crawlers consider this site not secure.
SERVER SOFTWARE
We discovered that junzhepan.github.io is weilding the GitHub.com operating system.SITE TITLE
ScorpionDESCRIPTION
0CTF 2015 Quals simpleapk Write-up. Simpleapk150 PtsThis is a simple apk, Could you find the flag? 逆向根据代码发现flag就存放在flag.txt中提取出来内容如下 0ctfToo Simple Sometimes Naive! 0CTF 2015 Quals VEZEL Write-up. VEZEL100 PtsEvermars says he is good at repackaging Android applications, for example. 逆向知道flag由两部分组成 签名和classes.dex的CRC 0CTF 2015 Quals x-y-z Write-up. 0CTF 2015 Quals peers Write-up. Peers100 Ptspeers P 用foremost提取出一张bmp图片信息无法查看对比文件格式没有问题 0CTF 2015 Quals treasure Write-up. BCTF 2015 weak enc Write-up.PARSED CONTENT
The site had the following in the web page, "Simpleapk150 PtsThis is a simple apk, Could you find the flag? 逆向根据代码发现flag就存放在flag." I observed that the web site stated "txt中提取出来内容如下 0ctfToo Simple Sometimes Naive! 0CTF 2015 Quals VEZEL Write-up." They also stated " VEZEL100 PtsEvermars says he is good at repackaging Android applications, for example. dex的CRC 0CTF 2015 Quals x-y-z Write-up. 0CTF 2015 Quals peers Write-up. Peers100 Ptspeers P 用foremost提取出一张bmp图片信息无法查看对比文件格式没有问题 0CTF 2015 Quals treasure Write-up. BCTF 2015 weak enc Write-up."