当前位置:网站首页>Cisp-pte practice explanation
Cisp-pte practice explanation
2022-07-06 08:24:00 【Colorful @ star】
CISP-PTE Explanation of practical exercises
List of articles
Preface
This time I'll explain to you all the question types of the exam
One 、 Upload files
The problem is very simple , Upload a Trojan horse for ant sword connection
The answer lies in key.php In file
We create a file , Inject a paragraph and a sentence into the Trojan horse , Change to zhi.jpg Upload files
GIF89a?
Write GIF89a? The purpose of this is to prove that it is a picture file
After uploading, you can capture packets and resend them , But you need to change the suffix to .php, And change it to case bypass , Will be eval Change it to Eval That's all right.
Let's open the picture to see if it can be opened
http://150.158.27.164:82/zhi.php
Find that you can open , We use ant sword to connect
The answer is :key2:adahhsh8
Two 、 Deserialization vulnerability
Deserialization vulnerabilities are some php Some loopholes caused by magic functions , The specific principles and methods have been discussed in my previous course of penetration testing , Again , Everyone should go back and review carefully , I'm not going to do that here .
Next , Let's answer the questions
Let's briefly explain php The cause of deserialization
First of all php The magic functions in are as follows
__construct() Called when an object is created
__destruct() Called when an object is destroyed
__toString() When an object is used as a string
__sleep() Run... Before the object is serialized
__wakeup Will be called immediately after serialization
These are some magic methods we should pay attention to , If the server can receive the string we deserialized 、 And put the variables directly into these magic methods without filtering , It is easy to cause serious loopholes .
At this time, there is no method or array in the code , In this way, it is much simpler ; He has only one unserialize()
unserialize() The function is used to pass serialize() Function to deserialize the serialized object or array , And return the original object structure
We construct it as follows vul.php?str=s:8:“CISP-PTE”;
Code audit , You can see
if (unserialize( s t r ) = = = " str) === " str)==="PTE")
{
echo “$key4”;
}
If you meet this condition, you can output the answer , Add this condition to the back of the website , That's all right.
http://49.232.193.10:84/start/vul.php?str=s:8:“CISP-PTE”;
After retransmission
The answer is :key4:pw3yx7fa
3、 ... and . Invalid access control
Just look at the title , Administrator user access is required , So to put it bluntly, it is to forge administrator identity and authority ,SSO Ultra vires ?
Without saying , Refresh the browser , Grab the bag
Put... Directly false Change to true; Well username Change the field to admin Corresponding base64 Encoding can
The answer is :key5:m9gbqjr6
summary
This time, we have summarized several common exam question types , Next, I will explain the second practical exercise for you .
边栏推荐
- 1. Color inversion, logarithmic transformation, gamma transformation source code - miniopencv from zero
- PHP - Common magic method (nanny level teaching)
- [2022 Guangdong saim] Lagrange interpolation (multivariate function extreme value divide and conquer NTT)
- 根据csv文件某一列字符串中某个数字排序
- TiDB备份与恢复简介
- 1204 character deletion operation (2)
- C language - bit segment
- Golang force buckle leetcode 1020 Number of enclaves
- 让学指针变得更简单(三)
- Learn Arduino with examples
猜你喜欢
NFT smart contract release, blind box, public offering technology practice -- jigsaw puzzle
The Vice Minister of the Ministry of industry and information technology of "APEC industry +" of the national economic and information technology center led a team to Sichuan to investigate the operat
2022.02.13 - NC003. Design LRU cache structure
NFT smart contract release, blind box, public offering technology practice -- contract
Nft智能合约发行,盲盒,公开发售技术实战--拼图篇
Go learning notes (3) basic types and statements (2)
[research materials] 2021 China online high growth white paper - Download attached
在 uniapp 中使用阿里图标
leetcode刷题 (5.28) 哈希表
【MySQL】锁
随机推荐
Migrate data from SQL files to tidb
Online yaml to CSV tool
Go learning notes (3) basic types and statements (2)
LDAP应用篇(4)Jenkins接入
A Closer Look at How Fine-tuning Changes BERT
指针进阶---指针数组,数组指针
让学指针变得更简单(三)
C语言自定义类型:结构体
Upgrade tidb with tiup
[Yugong series] creation of 009 unity object of U3D full stack class in February 2022
灰度升级 TiDB Operator
Wireshark grabs packets to understand its word TCP segment
NFT smart contract release, blind box, public offering technology practice -- jigsaw puzzle
远程存储访问授权
Yyds dry goods inventory three JS source code interpretation eventdispatcher
Upgrade tidb operator
NFT smart contract release, blind box, public offering technology practice -- contract
Leetcode question brushing (5.31) string
图像融合--挑战、机遇与对策
National economic information center "APEC industry +": economic data released at the night of the Spring Festival | observation of stable strategy industry fund