i春秋安全勇士--一些簡單題wp
基礎題60分
用firebug可以發現一段奇怪的js,
把eval改成alert,執行之後再改一下,最後會就是冒號隔開的一串數
然後改下格式 \x30 這種,然後轉16進位制,然後是md5解一下就可以了
培根
我年輕時注意到,我每做十件事有九件不成功,於是我就十倍地去努力幹下去。—— 蕭伯
納
ABAABAABAAABBAAABBAAAAAAABAAAAAAABB
正常培根解出即可
Base64
Base64的指令碼,
#! usr/bin/env python # -*- coding:utf-8 -*- import base64 import string a="6ZWc6Iqx5" b="C05pyI" c=["a","b","c","d","e","f","g","h","i","j","k","l","m","n","o","p","q","r","s","t","u","v","w","x","y","z","A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z","0","1","2","3","4","5","6","7","8","9","+","/"] for i in c: printbase64.b64decode(a+i+b),I,a+i+b
填鏡花水月 對應的 base64編碼就可以了
滲透測試_80pt
看原始碼發現k的長度是400px,而且題目為flag是彈出來的,於是構造k為:
400個a +一個空格+<script>alert(1);</script>
(其實不用這樣,直接寫js程式碼就好了…)
滲透測試_100pt
龍神的思路:根據提示可想到檔案包含漏洞,測試發現可以這樣利用
file=php://filter/read=convert.base64-encode/resource=index.php
發現沒什麼內容,然後用御劍掃一下目錄
發現有index.php,1234.php
看一下1234.php,內容base64解碼即可
流量分析_100pt
龍神的思路:wireshark開啟,然後 檔案-->匯出物件àhttp,
得到一堆asp頁面,然後開啟就找到flag了,在9,11中都可以找到
滲透測試_150pt(之前做過這題,忘了….)
Firebug看了下過程
先是login.php,然後是admin.Php,提示許可權不足後跳回index.php
在admin.php中,響應返回中有
Set-cookie:token=deleted
有一個cookie:token=ad0234829205b9033196ba818f7a872b
Md5
解密之後是test2(之後就是明神提示我)
之前做的時候就是各種猜測,在使用者名稱,密碼框輸各種東西,後來才知道把cookie改了就好了,用fiddler把cookie改成admin1的MD5值,然後提交,還有一個坑是3秒之後會重定向到登入頁面,我之前設定過火狐不允許自動重定向,所以沒坑到我,而且我是用fiddler抓包看的,直接就看到flag了(機智)
流量分析_200pt
稍微看了下,發現使用者名稱as,密碼asss,還有人在sql注入
不想看了,就想匯出一下,沒什麼用(其實有用,這題太弱智,直接搜flag就可以了)
之後又用foremost提取,一堆網頁,在最後一個網頁裡發現flag
流量分析_300pt
一開始很容易從資料包中分出一張中國地圖…..
之前還找過幾個exif資訊,但是沒用
然後訪問一下,發現是雲南,那就看看地圖上的雲南區域,發現真的有東西
看不太清,用ps來處理下,影象-à調整—>黑白
這樣就看的比較清楚了,也就知道了flag
flag{@[email protected]}
(其實一開始分離出這麼大的圖,就應該能想到)