当前位置:网站首页>Weekly CTF week 1: Amazing tapes
Weekly CTF week 1: Amazing tapes
2022-06-12 01:12:00 【Meng zhailu】
Magic tape
Weekly CTF: Course :Weekly CTF( Hetian network security laboratory ) (hetianlab.com)
subject
experiment : The first week | Magic tape ( Hetian network security laboratory ) (hetianlab.com)
The background that
None in this experiment writeup, Students need to give full play to what they have learned , Take the ultimate goal .
Experimental environment
Target machine :Centos7 IP Address :10.1.1.147:5001
attack :Win7 IP Address : Random allocation
requirement : Get the target flag
Tips :flag The format is Flag{}
notes : Tool path :C:\tools\
Answer key
start
A lot of times CTF The title is not very clear , I didn't know what to do at first , So try to use the information given , Try anything you can think of .
The title gives the goal IP Address , First visit it in the browser .

Try to think
1、 Use SQL Inject :123 or '1'='1', It's useless
2、 Use XSS sentence :<script>alert('hello,gaga!');</script>, It's useless
3、 View source code of webpage : There is a line of code at the bottom
<html><h1 style='font-size:0px;'>./Flag.txt</h1></html>
Try to visit http://10.1.1.147:5001/Flag.txt, False information !
4、 Try viewing web requests in the browser developer tool , Find the following information :

According to the suffix is = Guess it might be base64 code .
The above is a simple test , Then use professional tools burpsuite The official start of the .
Burp Suite
Burp Suite The tool is located in C:\tools\burpsuite\BurpLoader.jar
Use steps :
- Configure the proxy for the browser 127.0.0.1, Port is 8080
- Burp Suite The tool Proxy > HTTP history The packet capture record will be displayed
The currently intercepted requests will be displayed in Proxy > Intercept, Every time you intercept a web page, it gets stuck , Manual required Forward
You can also use this tool to capture packets Cokkie Information :

Use this tool to access the Cookie Conduct Base64 Decoder: Get a string of data , Enter into the form

You can input directly in the web page , You can also directly use the Repeater To send a request :

According to the new tips , Guess you should enter :tape, Return information :

Follow the prompts to visit :10.1.1.147:5001/Flag-Win.txt:

Follow the prompts to continue sending requests :btzhy

Follow the prompts to visit :10.1.1.147:5001/Flag-K0r4dji.php:

The source code of the view page is as follows :

According to the prompt, you should enter a 2 digit , Use it directly Burp Suite Of Intruder Blasting :
stay Proxy -> HTTP history Middle right click the packet capture path , choice Send to Intruder
stay Intruder -> Positions Middle first Clear $, Then select the local point to add parameters dynamically in the box Add $

stay Intruder -> Positions Set dynamic parameter properties in :

After setting up , Click... In the title bar Intruder -> Start attack Start attacking :

Check out the attack results , Found when the parameter is 66 when ,Length Different from others , It is found that the information we need is returned
The result is :Flag{ctf_victory_SecBug}
边栏推荐
- Websocket server practice
- 人们对于产业互联网的这样一种认识的转变,并不是一蹴而就的
- Interpretation of the guiding opinions on the digital transformation of banking and insurance industry by Analysys analysis
- ARP instruction
- 新知识:Monkey 改进版之 App Crawler
- [answer] in the business sequence diagram of XX shopping mall, is it drawn as a business executor (bank) or a business entity (banking system)
- VsCode - 保存文件自动格式化将单引号 ‘ 变成双引号 “ 的问题
- In depth description of Weibull distribution (2) meaning of parameters and formulas
- Lambda中间操作limit
- Article 5: Design of multi-functional intelligent trunk following control system | undergraduate graduation design - [learning of controller arduino+stm32]
猜你喜欢

Vscode - the problem of saving a file and automatically formatting the single quotation mark 'into a double quotation mark'

LabVIEW Arduino electronic weighing system (project Part-1)

Kill session? This cross domain authentication solution is really elegant

【ROE】(2)ROE协议

be based on. NETCORE development blog project starblog - (11) access statistics

System. Commandline option
![2022-06-11: note that in this document, graph is not the meaning of adjacency matrix, but a bipartite graph. In the adjacency matrix with length N, there are n points. Matrix[i][j] represents the dist](/img/ab/b3044472561ac366f2cbd878268132.png)
2022-06-11: note that in this document, graph is not the meaning of adjacency matrix, but a bipartite graph. In the adjacency matrix with length N, there are n points. Matrix[i][j] represents the dist

Intel trimbert: tailor Bert for trade-offs

一看就懂的JMeter操作流程
![Is interface automation difficult? Take you from 0 to 1 to get started with interface automation test [0 basic can also understand series]](/img/78/f36cdc53b94dc7da576d114a3eb2a6.png)
Is interface automation difficult? Take you from 0 to 1 to get started with interface automation test [0 basic can also understand series]
随机推荐
Lambda快速入门
[signalr complete series] Implementation of signalr packet communication in net6
A knowledge map (super dry goods, recommended collection!)
Jmeter接口测试之常用断言
Dr. wangxiting: understanding interpretable recommendation from the perspective of knowledge map and natural language generation
The CSV used for JMeter performance test is bullshit
【ROE】(2)ROE协议
Such a change in people's understanding of the industrial Internet is not achieved overnight
Lambda中间操作skip
Article 5: Design of multi-functional intelligent trunk following control system | undergraduate graduation design - [learning of controller arduino+stm32]
C language string and pointer - learning 25
Research Report on development status and investment suggestions of o-tert-butyl cyclohexyl acetate Market in the world and China 2022-2028
Article 8: Design of multi-functional intelligent trunk following control system | undergraduate graduation project - [reply and Q & a record of design completion]
One article to show you how to understand the harmonyos application on the shelves
Lambda终结操作forEach
About MySQL password modification failure
Big sword
Comparison of OpenCV basic codes of ros2 foxy~galactic~humble
Some suggestions on writing code to reproduce the paper!
模块八-设计消息队列存储消息数据的 MySQL 表格