【write up】攻防世界web新手区

攻防世界web新手区题解

view_source

Description


Solution

F12查看源代码


Flag

1
cyberpeace{99a46aeeb883d9ac6cfca0bb1873b025}

Request&Response

robots

Description

robots协议


Solution

访问robots.txt 进入 f1ag_1s_h3re.php


Flag

1
cyberpeace{6f815afb0a6ec2e682ee321e527514e0

Request&Response

backup

Description

备份文件


Solution

常见的备份文件后缀名有.git.svn.swp.~.bak.bash_history

逐个试发现是.bak


Flag

1
Cyberpeace{855A1C4B3401294CB6604CCC98BDE334}

Request&Response

Description

cookie


Solution

查看cookie.php,查看response


Flag

1
cyberpeace{145f0884121c8c2781fee9f16b92d9f4}

Request&Response

disabled_button

Description

简单的前端


Solution

修改源代码,删除disable=”” 点击按钮


Flag

1
cyberpeace{814987c1a6dfe2b03f411c066850cccc}

Request&Response

weak_auth

Description


Solution

随便输入账号密码登陆,提示please login as admin 用户名为admin

查看./check.php,提示需要字典,用burp suit抓包然后爆破

密码123456


Flag

1
cyberpeace{da513854c27598c9218495e27d2fc4f8}

Request&Response

simple_php

Description

PHP 弱类型语言


Solution

源代码:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
<?php
show_source(__FILE__);
include("config.php");
$a=@$_GET['a'];
$b=@$_GET['b'];
if($a==0 and $a){
echo $flag1;
}
if(is_numeric($b)){
exit();
}
if($b>1234){
echo $flag2;
}
?>

构造a和b,http://111.198.29.45:34874/?a='a'&b=12345a


Flag

1
Cyberpeace{647E37C7627CC3E4019EC69324F66C7C}

Request&Response

get_post

Description

get和post提交方式


Solution


Flag

1
cyberpeace{e93a457c9f99236245ff2862da98cd67}

Request&Response

xff_referer

Description

X-Forwarded-For和Referer


Solution

抓包,然后在请求头里添加X-Forwarded-For:123.123.123.123

响应头里发现flag

最早写的时候还考了refere,估计题目更新了


Flag

1
flag{Bugku_k8_23s_istra}

Request&Response

webshell

Description

蚁剑简单使用


Solution


Flag

1
cyberpeace{05ffdd9b7aab6420997d49490ab7cf99}

Request&Response

command_execution

Description

| 的作用为将前一个命令的结果传递给后一个命令作为输入

&&的作用是前一条命令执行成功时,才执行后一条命令


Solution

查询目录,一层层看,发现home文件下有flag.txt


Flag

1
cyberpeace{2cd7f54b5e11271d0496f8b50bb2287b}

Request&Response

simple_js

Description

js代码审计


Solution

源代码:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
<html>
<head>
<title>JS</title>
<script type="text/javascript">
function dechiffre(pass_enc){
var pass = "70,65,85,88,32,80,65,83,83,87,79,82,68,32,72,65,72,65";
var tab = pass_enc.split(',');
var tab2 = pass.split(',');var i,j,k,l=0,m,n,o,p = "";i = 0;j = tab.length;
k = j + (l) + (n=0);
n = tab2.length;
for(i = (o=0); i < (k = j = n); i++ ){o = tab[i-l];p += String.fromCharCode((o = tab2[i]));
if(i == 5)break;}
for(i = (o=0); i < (k = j = n); i++ ){
o = tab[i-l];
if(i > 5 && i < k-1)
p += String.fromCharCode((o = tab2[i]));
}
p += String.fromCharCode(tab2[17]);
pass = p;return pass;
}
String["fromCharCode"](dechiffre("\x35\x35\x2c\x35\x36\x2c\x35\x34\x2c\x37\x39\x2c\x31\x31\x35\x2c\x36\x39\x2c\x31\x31\x34\x2c\x31\x31\x36\x2c\x31\x30\x37\x2c\x34\x39\x2c\x35\x30"));

h = window.prompt('Enter password');
alert( dechiffre(h) );

</script>
</head>

</html>

发现只有(dechiffre("\x35\x35\x2c\x35\x36\x2c\x35\x34\x2c\x37\x39\x2c\x31\x31\x35\x2c\x36\x39\x2c\x31\x31\x34\x2c\x31\x31\x36\x2c\x31\x30\x37\x2c\x34\x39\x2c\x35\x30"));有用

exp:

1
2
3
4
5
6
7
string = "\x35\x35\x2c\x35\x36\x2c\x35\x34\x2c\x37\x39\x2c\x31\x31\x35\x2c\x36\x39\x2c\x31\x31\x34\x2c\x31\x31\x36\x2c\x31\x30\x37\x2c\x34\x39\x2c\x35\x30"
s = string.split(",")
c = ""
for i in s:
i = chr(int(i))
c = c+i
print(c)

Flag

1
Cyberpeace{786OsErtk12}

Request&Response

文章目录
  1. 1. view_source
    1. 1.1. Description
    2. 1.2. Solution
    3. 1.3. Flag
    4. 1.4. Request&Response
  2. 2. robots
    1. 2.1. Description
    2. 2.2. Solution
    3. 2.3. Flag
    4. 2.4. Request&Response
  3. 3. backup
    1. 3.1. Description
    2. 3.2. Solution
    3. 3.3. Flag
    4. 3.4. Request&Response
  4. 4. cookie
    1. 4.1. Description
    2. 4.2. Solution
    3. 4.3. Flag
    4. 4.4. Request&Response
  5. 5. disabled_button
    1. 5.1. Description
    2. 5.2. Solution
    3. 5.3. Flag
    4. 5.4. Request&Response
  6. 6. weak_auth
    1. 6.1. Description
    2. 6.2. Solution
    3. 6.3. Flag
    4. 6.4. Request&Response
  7. 7. simple_php
    1. 7.1. Description
    2. 7.2. Solution
    3. 7.3. Flag
    4. 7.4. Request&Response
  8. 8. get_post
    1. 8.1. Description
    2. 8.2. Solution
    3. 8.3. Flag
    4. 8.4. Request&Response
  9. 9. xff_referer
    1. 9.1. Description
    2. 9.2. Solution
    3. 9.3. Flag
    4. 9.4. Request&Response
  10. 10. webshell
    1. 10.1. Description
    2. 10.2. Solution
    3. 10.3. Flag
    4. 10.4. Request&Response
  11. 11. command_execution
    1. 11.1. Description
    2. 11.2. Solution
    3. 11.3. Flag
    4. 11.4. Request&Response
  12. 12. simple_js
    1. 12.1. Description
    2. 12.2. Solution
    3. 12.3. Flag
    4. 12.4. Request&Response
|