20145326 Network Security Defense learning platform-base off

Source: Internet
Author: User
Tags printable characters

20145326 Network Security Defense learning platform-base off

Introduction to some basic methods

Developer Tools: The General browser comes with the developer tool (shortcut is F12), click, you can view the current page of the source code, a smart browser, move the mouse to the specified code, will be in the corresponding location of the page shows the code rendered interface.

Burpsuite:burp Suite is an integrated platform for attacking Web applications. It contains a number of tools and has designed many interfaces for these tools to facilitate the process of speeding up attacks on applications. All tools share a powerful extensible framework that can handle and display HTTP messages, persistence, authentication, proxies, logs, alerts.

BASE64: is a representation of binary data based on 64 printable characters. The BASE64 encoding requires the conversion of 3 8-bit bytes (38=24) into 4 6-bit bytes (46=24), followed by 6 two in front of 0 bits, forming a 8-bit byte form, and the trailing padding of Base64 is the "=" number, which is used to make up the number of digits, with four characters as a block. At the very end, the "=" sign fills up with less than four characters.

Md5:message Digest Algorithm MD5 (Chinese named message Digest Algorithm version fifth) is a hash function widely used in the field of computer security to provide integrity protection of messages. Features are as follows:
Compressibility: Any length of data, the calculated length of the MD5 value is fixed.
Easy to calculate: It is easy to calculate the MD5 value from the original data.
Anti-modification: Make any changes to the original data, even if only 1 bytes are modified, the resulting MD5 value is very different.
Strong anti-collision: known raw data and its MD5 value, it is very difficult to find a data with the same MD5 value (that is, falsification of data).
ROT-13:
ROT13 (Rotary 13-bit, rotateby13places, sometimes a minus sign in the middle is called ROT-13) is a simple replacement cipher. It is a tool used in web forums to hide gossip, tips, puzzles, and some dirty words, with the aim of escaping a quick glimpse of moderators or administrators.
ROT13 is its own reverse, that is, to restore the ROT13, the same algorithm can be used to encrypt, so the same operation can be re-encrypted and decrypted. The algorithm does not provide true cryptographic security, so it should not be applied to the purpose of preservation. It is often used as a typical example of weak cryptography. ROT13 inspires a wide range of online letter writing and alphabet games, and it is often mentioned in newsgroup dialogues.
Robots.txt:Robots protocol (also known as Reptile Protocol, robot Protocol, etc.) is the full name of "web crawler Exclusion Standard" (Robots Exclusion Protocol), the site through the robots protocol to tell the search engine which pages can be crawled, which pages do not crawl

Topics & Answers

The first answer: Jflsjklejflkdsjfklds, select the Developer tool (F12) to view the source code.

The second answer: 23ksdjfkfds, set in the "re-encryption once you get key" is the key, referred to a "rotation" mechanism, and encryption two times after the ciphertext and the same text. Consistent with the ROT13 encryption mechanism, it can be cracked using the online ROT13 online encryption and decryption device.

The third answer: jkljdkl232jkljkdl2389, according to the characteristics of the given string-with "=" end, ciphertext and so long, presumably using BASE64 encryption, so online BASE64 encryption on-line decryption can be.

The fourth answer: BIGHP, since the title has been said to be MD5 encryption, it is directly using the online MD5 decryption encryption can be.

The fifth answer: (tu687jksf6&, generally read the source code first, the results did not find any useful information.) Then think about this topic, how does it know that I am not a foreigner to stop me outside? There must be something special that identifies me, can I make it feel like I'm a foreigner by modifying this thing? So this time to use the Burpsuite tool to achieve the function of grasping the package. The results show that accept-language:zh-cn,zh;q=0.8 is shown, and it is changed to: accept-language:en-us,en;q=0.8 can get key key.

Answer to question sixth: Meiyouhahaliulanqi,haha browser. It is said that the information security team recently developed a new browser called haha browser, some topics must be haha browser to correct. Xiao Ming classmate resolutely do not install haha browser, afraid there is a back door, but how can this need to install haha browser can have the problem? Also first look at the source code, did not find, grab the bag. Depending on the information in the package and the topic tip, simply add the user-agent as "HAHA" to view the Web interface.


Question seventh: Where exactly is Kjh%#$#%fdjjj,key? The last time Xiao Ming classmate easily found the key, so there is a strengthened version of the key to find, then the key will be hidden where it? Old routines, first look at the source code, and then grab the bag, it is a pity nothing. It's time to look back at the package and see what's special.

The eighth question: Ohhttp302dd,key and can not find. Xiao Ming can not find the key to go where, can you help him find key? The old routine, and then in the last return package found the following prompt, at this time only need to change the page after the address of key_is_here_now_.php can be found in the new Web interface key.

The nineth question: yescookieedit7823789kj, Xiao Ming came to a website, or want key, but how all can not log on, could you help him to land? The old routine, found in the grab bag has such a statement related to the content of the topic cookie:login=0; it is not the value of the Login to 1 will be able to, try to do it! The key is then found in the new web interface.

Question tenth: 768hkyu678567&*&k, compare the number size. As long as the number on the server is larger than it is possible! Website on the number of input to do a limit, can only enter 3, obviously online preset is how big it? I'm going to be bigger than that. View the source code, modify the input format limit, change maxlength= "3" to Maxlength= "9", then enter 9 9, submit, and display the key.

Question 11th: 768hkyu678567&*&k, the temptation of the Local. Xiao Ming scanned His beloved little red computer, found that opened a 80 port, but when Xiao Ming to visit but found only allowed from local access, but his beloved little Red dare not let this strange Xiao Ming touch her computer, but Xiao Ming really want to know the small red Computer 80 port in the end what Secret (key)? Look at the package, found that there is no x-forwarded-for, usually the IP address of the site to determine the source is through the HTTP request x-forwarded-for or in other environment variables to find, here we construct a x-forwarded-for in the request package : 127.0.0.1 can get key.

Question 12th: UIJ%%IOOQWEQWSDF, will not let you visit. Xiao Ming designed a Web site, because always suffer from hacker attacks backstage, so this time he put the backstage to a no matter what people can not find the place .... Can finally be found by hackers, and was placed a black page, wrote: Find you, no more than 3 secs! method is as follows: First step: Open customs address, show I am index.php, I am not the admin page, key is In admin page. Step Two: Follow the instructions to change the end of the URL directory to admin, Web page display: The requested url/base12_44f0d8a96eed21afdc4823a0bf1a316b/admin is not Found on the this server. Description Admin cannot be found. The third step: At this point you can find the robots.txt inside disallow:/9fb97531fe95594603aff7e794ab2f5f/, and access the secondary path. Fourth step: show you find me,but I am not the login page. Keep search. Fifth: Type the login.php address at the end of the current URL to get the key.

Feeling experience: Actually still feel more interesting, although a lot of things at the beginning will not, but I feel very fresh, have the motivation to study! Gradually through the collection of materials and materials, organize your thoughts, and finally come to key! The most important thing is that this process can bring me a lot of thinking improvement ~

20145326 Network Security Defense learning platform-base off

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.