1. 程式人生 > >i春秋安全勇士--一些簡單題wp

i春秋安全勇士--一些簡單題wp

基礎題60分

用firebug可以發現一段奇怪的js,

把eval改成alert,執行之後再改一下,最後會就是冒號隔開的一串數

然後改下格式  \x30  這種,然後轉16進位制,然後是md5解一下就可以了

培根

輕時意到,每做十件事有九件不成功,於是我就十倍去努力幹下去。—— 蕭

ABAABAABAAABBAAABBAAAAAAABAAAAAAABB

正常培根解出即可

 Base64

Base64的指令碼,

#! usr/bin/env python

# -*- coding:utf-8 -*-

import base64

import string

 

a="6ZWc6Iqx5"

b="C05pyI"

c=["a","b","c","d","e","f","g","h","i","j","k","l","m","n","o","p","q","r","s","t","u","v","w","x","y","z","A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z","0","1","2","3","4","5","6","7","8","9","+","/"]

for i in c:

         printbase64.b64decode(a+i+b),I,a+i+b


填鏡花水月 對應的 base64編碼就可以了

滲透測試_80pt

看原始碼發現k的長度是400px,而且題目為flag是彈出來的,於是構造k為:

400個a +一個空格+<script>alert(1);</script>

(其實不用這樣,直接寫js程式碼就好了…)

滲透測試_100pt

龍神的思路:根據提示可想到檔案包含漏洞,測試發現可以這樣利用

file=php://filter/read=convert.base64-encode/resource=index.php

發現沒什麼內容,然後用御劍掃一下目錄

發現有index.php,1234.php

看一下1234.php,內容base64解碼即可

流量分析_100pt

龍神的思路:wireshark開啟,然後  檔案-->匯出物件àhttp,

得到一堆asp頁面,然後開啟就找到flag了,在9,11中都可以找到

滲透測試_150pt(之前做過這題,忘了….)

Firebug看了下過程

先是login.php,然後是admin.Php,提示許可權不足後跳回index.php

在admin.php中,響應返回中有

Set-cookie:token=deleted

有一個cookie:token=ad0234829205b9033196ba818f7a872b

Md5解密之後是test2(之後就是明神提示我)

之前做的時候就是各種猜測,在使用者名稱,密碼框輸各種東西,後來才知道把cookie改了就好了,用fiddler把cookie改成admin1的MD5值,然後提交,還有一個坑是3秒之後會重定向到登入頁面,我之前設定過火狐不允許自動重定向,所以沒坑到我,而且我是用fiddler抓包看的,直接就看到flag了(機智)

流量分析_200pt

稍微看了下,發現使用者名稱as,密碼asss,還有人在sql注入

不想看了,就想匯出一下,沒什麼用(其實有用,這題太弱智,直接搜flag就可以了)

之後又用foremost提取,一堆網頁,在最後一個網頁裡發現flag

流量分析_300pt

一開始很容易從資料包中分出一張中國地圖…..

之前還找過幾個exif資訊,但是沒用

然後訪問一下,發現是雲南,那就看看地圖上的雲南區域,發現真的有東西

看不太清,用ps來處理下,影象-à調整—>黑白

這樣就看的比較清楚了,也就知道了flag

flag{@[email protected]}

(其實一開始分離出這麼大的圖,就應該能想到)