当前位置:网站首页>Cisp-pte practice explanation
Cisp-pte practice explanation
2022-07-06 08:24:00 【Colorful @ star】
CISP-PTE Explanation of practical exercises
List of articles
Preface
This time I'll explain to you all the question types of the exam
One 、 Upload files
The problem is very simple , Upload a Trojan horse for ant sword connection 
The answer lies in key.php In file 
We create a file , Inject a paragraph and a sentence into the Trojan horse , Change to zhi.jpg Upload files
GIF89a?
Write GIF89a? The purpose of this is to prove that it is a picture file 
After uploading, you can capture packets and resend them , But you need to change the suffix to .php, And change it to case bypass , Will be eval Change it to Eval That's all right. 

Let's open the picture to see if it can be opened
http://150.158.27.164:82/zhi.php
Find that you can open , We use ant sword to connect 



The answer is :key2:adahhsh8
Two 、 Deserialization vulnerability

Deserialization vulnerabilities are some php Some loopholes caused by magic functions , The specific principles and methods have been discussed in my previous course of penetration testing , Again , Everyone should go back and review carefully , I'm not going to do that here .
Next , Let's answer the questions 

Let's briefly explain php The cause of deserialization
First of all php The magic functions in are as follows
__construct() Called when an object is created
__destruct() Called when an object is destroyed
__toString() When an object is used as a string
__sleep() Run... Before the object is serialized
__wakeup Will be called immediately after serialization
These are some magic methods we should pay attention to , If the server can receive the string we deserialized 、 And put the variables directly into these magic methods without filtering , It is easy to cause serious loopholes .
At this time, there is no method or array in the code , In this way, it is much simpler ; He has only one unserialize()
unserialize() The function is used to pass serialize() Function to deserialize the serialized object or array , And return the original object structure
We construct it as follows vul.php?str=s:8:“CISP-PTE”;
Code audit , You can see
if (unserialize( s t r ) = = = " str) === " str)==="PTE")
{
echo “$key4”;
}
If you meet this condition, you can output the answer , Add this condition to the back of the website , That's all right.
http://49.232.193.10:84/start/vul.php?str=s:8:“CISP-PTE”;
After retransmission 
The answer is :key4:pw3yx7fa
3、 ... and . Invalid access control


Just look at the title , Administrator user access is required , So to put it bluntly, it is to forge administrator identity and authority ,SSO Ultra vires ?
Without saying , Refresh the browser , Grab the bag 
Put... Directly false Change to true; Well username Change the field to admin Corresponding base64 Encoding can 
The answer is :key5:m9gbqjr6
summary
This time, we have summarized several common exam question types , Next, I will explain the second practical exercise for you .
边栏推荐
- Use dumping to back up tidb cluster data to S3 compatible storage
- 【MySQL】日志
- "Friendship and righteousness" of the center for national economy and information technology: China's friendship wine - the "unparalleled loyalty and righteousness" of the solidarity group released th
- Restore backup data on S3 compatible storage with tidb lightning
- 面向个性化需求的在线云数据库混合调优系统 | SIGMOD 2022入选论文解读
- National economic information center "APEC industry +": economic data released at the night of the Spring Festival | observation of stable strategy industry fund
- Deep learning: derivation of shallow neural networks and deep neural networks
- hcip--mpls
- 【MySQL】锁
- Summary of phased use of sonic one-stop open source distributed cluster cloud real machine test platform
猜你喜欢

【MySQL】数据库的存储过程与存储函数通关教程(完整版)

Synchronized solves problems caused by sharing
![[research materials] 2022 enterprise wechat Ecosystem Research Report - Download attached](/img/35/898a8086bc35462b0fcb9e6b58b86b.jpg)
[research materials] 2022 enterprise wechat Ecosystem Research Report - Download attached

hcip--mpls

化不掉的钟薛高,逃不出网红产品的生命周期

ESP系列引脚說明圖匯總

tree树的精准查询

IOT -- interpreting the four tier architecture of the Internet of things
![[MySQL] database stored procedure and storage function clearance tutorial (full version)](/img/27/e775e03b77c7195216bc50c5cbefb4.png)
[MySQL] database stored procedure and storage function clearance tutorial (full version)

Easy to use tcp-udp_ Debug tool download and use
随机推荐
Colorlog结合logging打印有颜色的日志
IP lab, the first weekly recheck
LDAP application (4) Jenkins access
指针进阶---指针数组,数组指针
[secretly kill little partner pytorch20 days -day01- example of structured data modeling process]
All the ArrayList knowledge you want to know is here
Wireshark grabs packets to understand its word TCP segment
tree树的精准查询
灰度升级 TiDB Operator
LDAP Application Section (4) Jenkins Access
The State Economic Information Center "APEC industry +" Western Silicon Valley will invest 2trillion yuan in Chengdu Chongqing economic circle, which will surpass the observation of Shanghai | stable
【MySQL】日志
化不掉的钟薛高,逃不出网红产品的生命周期
Asia Pacific Financial Media | designer universe | Guangdong responds to the opinions of the national development and Reform Commission. Primary school students incarnate as small community designers
[MySQL] database stored procedure and storage function clearance tutorial (full version)
The Vice Minister of the Ministry of industry and information technology of "APEC industry +" of the national economic and information technology center led a team to Sichuan to investigate the operat
LDAP應用篇(4)Jenkins接入
从 CSV 文件迁移数据到 TiDB
JS select all and tab bar switching, simple comments
好用的TCP-UDP_debug工具下载和使用