当前位置:网站首页>Cisp-pte practice explanation
Cisp-pte practice explanation
2022-07-06 08:24:00 【Colorful @ star】
CISP-PTE Explanation of practical exercises
List of articles
Preface
This time I'll explain to you all the question types of the exam
One 、 Upload files
The problem is very simple , Upload a Trojan horse for ant sword connection 
The answer lies in key.php In file 
We create a file , Inject a paragraph and a sentence into the Trojan horse , Change to zhi.jpg Upload files
GIF89a?
Write GIF89a? The purpose of this is to prove that it is a picture file 
After uploading, you can capture packets and resend them , But you need to change the suffix to .php, And change it to case bypass , Will be eval Change it to Eval That's all right. 

Let's open the picture to see if it can be opened
http://150.158.27.164:82/zhi.php
Find that you can open , We use ant sword to connect 



The answer is :key2:adahhsh8
Two 、 Deserialization vulnerability

Deserialization vulnerabilities are some php Some loopholes caused by magic functions , The specific principles and methods have been discussed in my previous course of penetration testing , Again , Everyone should go back and review carefully , I'm not going to do that here .
Next , Let's answer the questions 

Let's briefly explain php The cause of deserialization
First of all php The magic functions in are as follows
__construct() Called when an object is created
__destruct() Called when an object is destroyed
__toString() When an object is used as a string
__sleep() Run... Before the object is serialized
__wakeup Will be called immediately after serialization
These are some magic methods we should pay attention to , If the server can receive the string we deserialized 、 And put the variables directly into these magic methods without filtering , It is easy to cause serious loopholes .
At this time, there is no method or array in the code , In this way, it is much simpler ; He has only one unserialize()
unserialize() The function is used to pass serialize() Function to deserialize the serialized object or array , And return the original object structure
We construct it as follows vul.php?str=s:8:“CISP-PTE”;
Code audit , You can see
if (unserialize( s t r ) = = = " str) === " str)==="PTE")
{
echo “$key4”;
}
If you meet this condition, you can output the answer , Add this condition to the back of the website , That's all right.
http://49.232.193.10:84/start/vul.php?str=s:8:“CISP-PTE”;
After retransmission 
The answer is :key4:pw3yx7fa
3、 ... and . Invalid access control


Just look at the title , Administrator user access is required , So to put it bluntly, it is to forge administrator identity and authority ,SSO Ultra vires ?
Without saying , Refresh the browser , Grab the bag 
Put... Directly false Change to true; Well username Change the field to admin Corresponding base64 Encoding can 
The answer is :key5:m9gbqjr6
summary
This time, we have summarized several common exam question types , Next, I will explain the second practical exercise for you .
边栏推荐
- Zhong Xuegao, who cannot be melted, cannot escape the life cycle of online celebrity products
- Golang DNS write casually
- It's hard to find a job when the industry is in recession
- 将 NFT 设置为 ENS 个人资料头像的分步指南
- leetcode刷题 (5.31) 字符串
- Remote storage access authorization
- 好用的TCP-UDP_debug工具下载和使用
- [research materials] 2022 China yuancosmos white paper - Download attached
- Leetcode question brushing record | 203_ Remove linked list elements
- LDAP Application Section (4) Jenkins Access
猜你喜欢

【MySQL】日志

Wireshark grabs packets to understand its word TCP segment

vulnhub hackme: 1

Convolution, pooling, activation function, initialization, normalization, regularization, learning rate - Summary of deep learning foundation
![[t31zl intelligent video application processor data]](/img/67/b77c1de990d9b8868f8df5e55b0227.png)
[t31zl intelligent video application processor data]

Asia Pacific Financial Media | female pattern ladyvision: forced the hotel to upgrade security. The drunk woman died in the guest room, and the hotel was sentenced not to pay compensation | APEC secur

2022.02.13 - NC002. sort

ESP系列引脚說明圖匯總

C language custom type: struct

hcip--mpls
随机推荐
使用 BR 恢复 S3 兼容存储上的备份数据
Hcip day 16
Learn Arduino with examples
[Yugong series] creation of 009 unity object of U3D full stack class in February 2022
Fibonacci sequence
Artcube information of "designer universe": Guangzhou implements the community designer system to achieve "great improvement" of urban quality | national economic and Information Center
It's hard to find a job when the industry is in recession
Use dumping to back up tidb cluster data to S3 compatible storage
2022.02.13 - NC003. Design LRU cache structure
Migrate data from a tidb cluster to another tidb cluster
华为云OBS文件上传下载工具类
2022.02.13 - NC004. Print number of loops
[2022 Guangdong saim] Lagrange interpolation (multivariate function extreme value divide and conquer NTT)
Wireshark grabs packets to understand its word TCP segment
Analysis of Top1 accuracy and top5 accuracy examples
Use Alibaba icon in uniapp
logback1.3. X configuration details and Practice
Synchronized solves problems caused by sharing
使用 BR 备份 TiDB 集群数据到兼容 S3 的存储
PHP - Common magic method (nanny level teaching)