当前位置:网站首页>misc-log analysis of CTF
misc-log analysis of CTF
2022-07-30 06:34:00 【[email protected]】
1. Injection audit
The questioner usually uses sqlmap to run an injection point, and saves the log after running the data, so that the contestant can judge what data is injected by sqlmap. This data is usually a flag.
2, command execution audit
The questioner usually uses the one-word Trojan horse to perform a series of sensitive operations, or pretends not to know the password of the one-word Trojan horse at first, so as to carry out a series of blasting behaviors, so that the contestants can judge the password of the one-word Trojan horse.
版权声明
本文为[[email protected]]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/211/202207300539173669.html
边栏推荐
猜你喜欢
随机推荐
uni-app:uni-icons的使用及如何自定义图标
在弹性布局flex布局中,行内标签也能直接加宽高
C语言(1)
npm install和npm install --save
典型线程问题综合演示
函数(c语言)
卷王的第一篇博客——编程学习的规划
FastAPI 快速入门
jsonpath
[HCTF 2018]admin
C语言(字符串,转义字符,关键字)
vulnhub-XXE ctf安全真题
C语言人机大战之三字棋博弈
MySQL数据库之JDBC编程
[PASECA2019]honey_shop
Art-template 中文文档[详细篇]
强国杯初赛WP
运算符和交互基础
Solution to TypeError The view function did not return a valid response. The function either returned None
SSTI靶场







