当前位置:网站首页>Ctfshow_web entry information collection CSDN creation punch in;
Ctfshow_web entry information collection CSDN creation punch in;
2022-07-23 05:20:00 【Martin_ ctf】
List of articles
- web1 Source code
- web2 js Foreground interception
- web3
- web4 robots Backstage leaks
- web5 PHPS Source code leakage
- web6 Source code compressed package leak
- web7 git Version control divulges source code
- web8 svn Version control divulges source code
- web9 vim Temporary file disclosure
- web10 cookie Let the cat out of the
- web11 domain name txt Record leakage
- web12
- web13 Disclosure of internal technical documents
- web14 The editor is not configured properly
- web15 Password logic error
- web16 Probe leak
- web17 CDN through
- web18 js Leakage of sensitive information
- web19
- web20 Database malicious download
- web20 Database malicious download
web1 Source code
Use this question directly F12 Check the source code to get flag
web2 js Foreground interception
Open cannot view source code ,F12, The right mouse button doesn't work .
Four ways :
- Ctrl+U
- Ctrl+Shift+I( According to )
- Set up - More tools -web Developer tools
- Add before the website
view-sourceView source code
obtain flag
web3
Two ways
- Tips for catching bags , Agent grabs bag , Then send it to the right mouse button repeater, Click on GO, see response, obtain flag
- F12, The Internet , Response head , find flag
web4 robots Backstage leaks
hint: Someone always writes the background address to robots, Help the black and rich guys lead the way .( The essence is a gentleman's agreement )
url Input /robots.txt, Enter... At the prompt /flagishere.txt, obtain flag
web5 PHPS Source code leakage
hint:phps Source code leaks can sometimes help
visit /index.phps, Download backup files , obtain flag
web6 Source code compressed package leak
hint: Unzip the source code to the current directory , Test ok , Call it a day
visit www.zip Download the source code , Decompression is obtained. fl000g.txt, What's inside is fake flag, You need access to get the truth flag
web7 git Version control divulges source code
visit /.git/
web8 svn Version control divulges source code
visit /.svn/`
web9 vim Temporary file disclosure
In the use of vim Unexpected exit at , A backup file will be generated in the directory ( Swap file ), The format is . file name .swp, visit /index.php.swp Download backup files , obtain flag
web10 cookie Let the cat out of the
F12 - The Internet - cookie - flag
web11 domain name txt Record leakage
Domain names can also hide information , such as ctfshow.com Just hide a message
Resolve the domain name according to the prompt ctfshwo.com, website http://www.jsons.cn/nslookup/
web12
Here we continue to visit directly robots.txt, Continue to visit according to the information continue to visit /admin The password is at the bottom of the previous web page Obtained after successful input falg!!
web13 Disclosure of internal technical documents
There should be no sensitive information in the technical documents , After deployment to the production environment, modify the default password in time
Watch the web page , At the bottom document There are hyperlinks . After opening, I found the user name , Password and website , Visit the website directly and return 404, According to the website prompt , visit /system1103/login.php, Log in and get flag
web14 The editor is not configured properly
Sometimes the source code can inadvertently reveal important (editor) Information about , The default configuration kills people
visit /ediotr, Found a compiler , Click to upload the picture , You can see it in it /var/www/html/nothinghere/ There is fl000g.txt file , visit /nothinghere/fl000g.txt, obtain flag
web15 Password logic error
Public information, such as email , May cause information leakage , Have serious consequences
visit /admin, Forget the password , Just submit your city , According to the of the web page QQ mailbox , find QQ Number , Add friends to get the address Xi'an , Reset to get the password admin7789. Login username admin, You can get flag
web16 Probe leak
For test probes , Delete in time after use , May cause information disclosure
According to the prompt , visit /tz.php, Click on phpinfo, find flag
web17 CDN through
Through heavy caching , Find the ctfer.com The real IP, Submit flag{IP Address }
Command window ping ctfer.com obtain IP The address submission is incorrect , The official said ping www.ctfer.com, It's not good to try ,ping ctfshow.com Get the right ip Address .
web18 js Leakage of sensitive information
A little game ,Crtl+U visit js Source code , Click on src="js/Flappy_js.js", Find out about flag The sentence of
if(score>100){
var result = .....;
}
Found a string of unicode code , Decode to get You win , Go to Yaoyao Yipi to have a look , visit 110.php, obtain flag
web19
1、 Directly view the page source code , Found a piece of comment code , The user name and password have been given in the code , But if a form is submitted, the password will be encrypted , So use hackbar Tools ,POSTA Submit username=admin&pazzword=a599ac85a73384ee3219fa684296eaa62667238d608efa81837030bd1ce1bf04 , obtain flag.
2、 After viewing the source code , notice AES encryption
namely AES Encrypted as a599ac85a73384ee3219fa684296eaa62667238d608efa81837030bd1ce1bf04
take key and iv( Offset ) Take it to AES Decryption is flag
web20 Database malicious download
mdb Documents are early asp+access The database file of the framework , A file leak is equivalent to the database being stripped .
7238d608efa81837030bd1ce1bf04 take key and iv`( Offset ) Take it to AES Decryption is flag
web20 Database malicious download
mdb Documents are early asp+access The database file of the framework , A file leak is equivalent to the database being stripped .
In the early asp+access The database file of the schema is db.mdb, Direct view url Add path /db/db.mdb Download the file , Open search with Notepad flag that will do
边栏推荐
- Druid source code reading 8-druiddatasource removeabandoned mechanism
- Filter拦截器和过滤器
- VSCode 环境配置管理
- Leetcode-494. objectives and
- DOM—节点操作
- GIC Introduction (III) -- gic400 register
- Druid源码阅读8-DruidDataSource的removeAbandoned机制
- Basic knowledge of C language
- Netlist simulation introduce
- Leetcode-188. the best time to buy and sell stocks IV
猜你喜欢

Code random notes_ Linked list_ 142 circular linked list II

合肥工业大学信息论与编码课程设计,含代码,可视化界面,课设报告

CreateProcess 输出重定向

C语言基础 - 字符串/字符数组最易错考点

Leetcode-583. Deleting two strings

ba_ Shell learning summary

DOM - node operation (II)

Modify oracle19c to monitor IP and restart under Linux centos7 environment

Connect to the server with vscode's remote SSH plug-in in the offline environment

GIC Introduction (II) - use of gic400
随机推荐
leetcode-415.字符串相加
Introduction to makefile
leetcode-213.打家劫舍 II
Druid source code read 6-preparedstatementpool source code and usage scenario analysis
Druid source code read the recycle process of 7-druiddatasource
Low in SoC_ Power simple control
Emotional tendency calculation based on Baidu AI Cloud platform
正则表达式常用的限定符&&Cookie
leetcode-241.为运算表达式设计优先级
认识以及安装redis
jena-fuseki 在线更新数据库
代码随想录笔记_链表_206反转链表
《ctfshow vip限免题目|CSDN创作打卡》
理解OOP以及常见面试题
js--Date對象&三元錶達式
Nodejs implements scheduled tasks
Druid source code reading 8-druiddatasource removeabandoned mechanism
Verilog pit avoidance Guide (continuously updated)
表单验证和正则表达式(一)
Netlist simulation introduce