当前位置:网站首页>Advanced area of attack and defense world web masters ics-06
Advanced area of attack and defense world web masters ics-06
2022-07-29 00:17:00 【Ant200】
1. Go to the link , Click the content in the page 
2. Only found The report center has feedback , It means that the content in other places has been deleted , According to the prompt " Only one place left traces of intruders " Then it can be inferred that it is mostly here .
3. When I was doing this , Time observed 2018 year 1 month 1 Japan , At first, I thought that there should be a breakthrough in screening by this day , There was no feedback .
4. Watch the page , Find out url There are parameters in id=1, Try to put 1 Switch to 2,3,4 Found that the page did not change , So I'm going to use bp Blast

5. Grab a packet and send it to Intruder

6. choice number( The Chinese version I use ) from 1 Start to 10000, The interval is 1
7. Found out 2333 The return value here is different

visit id=2333 The interface of , Success appears flag

summary : It's a simple explosion
边栏推荐
- Introduction and solution of common security vulnerabilities in web system CSRF attack
- Application of Devops in Internet of things solutions
- 【TA-霜狼_may-《百人计划》】图形3.6 纹理压缩——包体瘦身术
- Leetcode 763. partition labels divide alphabetic intervals (medium)
- 1-6 state与绑定事件
- Event extraction and documentation (2018)
- Idea error running 'application' command line is too long solution
- What do you need to bring with you for the NPDP exam? Stationery carrying instructions
- AutoCAD -- import excel tables into CAD and merge CAD
- Servlet运行原理_API详解_请求响应构造进阶之路(Servlet_2)
猜你喜欢

【TA-霜狼_may-《百人计划》】图形3.6 纹理压缩——包体瘦身术

CANoe应用案例之DoIP通信

Powercl batch creates and manages virtual switches

Real time data warehouse: Netease strictly selects the practice of real-time data warehouse based on Flink

Interpretation of ISO 13400 (doip) standard
![[microservice] Nacos cluster building and loading file configuration](/img/50/7af220c57a06eb186729c9882d9dab.png)
[microservice] Nacos cluster building and loading file configuration

【C】替换空格,宏实现整数的二进制奇偶位交换

Multi sensor fusion positioning (I) -- 3D laser odometer

The failure rate is as high as 80%. How to correctly complete the strategic planning of digital transformation?

curl (7) Failed connect to localhost8080; Connection refused
随机推荐
Multimodal model sketch (1)
What is in word?:^ p
Leetcode60. permutation sequence
EN 12101-8:2011 smoke dampers for smoke and heat control systems - CE certification
Centos7 install mysql8
【C】 Introduction and Simulation Implementation of ATOI and offsetof
Three years after graduation, write to you and me who may be confused [turn]
feign调用不通问题,JSON parse error Illegal character ((CTRL-CHAR, code 31)) only regular white space (r
Sword finger offer 55 - I. depth of binary tree
PIP image download
Introduction and solution of common security vulnerabilities in web system CSRF attack
Those "experiences and traps" in the data center
Powercli VMware vCenter deploys conventional new VMS in batch through self built PXE server with one click
centos7安装mysql8
curl (7) Failed connect to localhost8080; Connection refused
Concurrency in go
ZABBIX 5.0 uses its own redis template for monitoring
What does WGet mean
Eye of depth (18) -- partial derivative
Install MySQL using Yum for Linux