当前位置:网站首页>[attack and defense world | WP] cat
[attack and defense world | WP] cat
2022-07-04 08:31:00 【ethanyi9】
【 Attack and defend the world | WP】CAT
The problem solving steps
analysis
Open the page to see
Input url Found no response , And input 127.0.0.1 This kind of ip After the address , Echo occurred
Find out url You can enter values directly , Let's try wide byte input , That is input %80, The error reporting interface appears
Replace the error reporting interface with html, Found to be Django Error reporting interface
The bosses say yes django The code is set to gbk Caused wide characters to be incorrectly encoded ( More than the ascii Code range ).
The idea behind is to look at the prompt directly , I heard that there was a hint during the game
That is to say, it can be used @ And file path
Then we can only follow the train of thought , That is, first look at the previous error page database The path of ( There is no idea to find others here , Just look at the database first )
Then read the file , Input
@/opt/api/database.sqlite3
Learning knowledge
URL code
What is? URL code
url Coding is a coding format , It and utf-8 perhaps GBK The difference in coding is url Encoding is for characters other than alphanumeric , for instance :
- ASCII Character control code : character in range 00-1F Hexadecimal (0-31 Decimal system ) and 7F(127 Decimal system )
- Not ASCII Encoding format characters , such as GBK code 、utf-8 Code the Chinese character part of these two codes ( notes :GBK Chinese characters in the code are two bytes , stay url In the code, it is shaped like %B4%BA, and utf-8 It's three bytes , stay url In the code, it is shaped like %E6%98%A5)
边栏推荐
- 广和通高性能4G/5G无线模组解决方案全面推动高效、低碳智能电网
- @Role of requestparam annotation
- R language ggplot2 visualization: ggplot2 visualization grouping box diagram, place the legend and title of the visualization image on the top left of the image and align them to the left, in which th
- The text box displays the word (prompt text) by default, and the text disappears after clicking.
- Take you to master the formatter of visual studio code
- How to solve the problem of computer jam and slow down
- How to set multiple selecteditems on a list box- c#
- 学习Nuxt.js
- Collections in Scala
- Azure ad domain service (II) configure azure file share disk sharing for machines in the domain service
猜你喜欢
Comprendre la méthode de détection des valeurs aberrantes des données
Système de surveillance zabbix contenu de surveillance personnalisé
运动【跑步 01】一个程序员的半马挑战:跑前准备+跑中调整+跑后恢复(经验分享)
How to solve the problem of computer jam and slow down
User login function: simple but difficult
ctfshow web255 web 256 web257
What if the wireless network connection of the laptop is unavailable
Basic operations of databases and tables ----- view data tables
Email alarm configuration of ZABBIX monitoring system
墨者学院-PHPMailer远程命令执行漏洞溯源
随机推荐
SSRF vulnerability exploitation - attack redis
Famous blackmail software stops operation and releases decryption keys. Most hospital IOT devices have security vulnerabilities | global network security hotspot on February 14
C#实现一个万物皆可排序的队列
Basic operations of databases and tables ----- view data tables
【性能測試】一文讀懂Jmeter
运动【跑步 01】一个程序员的半马挑战:跑前准备+跑中调整+跑后恢复(经验分享)
AcWing 244. Enigmatic cow (tree array + binary search)
1. Qt入门
Do you know about autorl in intensive learning? A summary of articles written by more than ten scholars including Oxford University and Google
deno debugger
Unity-Text上标平方表示形式+text判断文本是否为空
1、卡尔曼滤波-最佳的线性滤波器
What if I forget the router password
Add log file to slim frame - PHP
Cannot click button when method is running - C #
Moher College webmin unauthenticated remote code execution
[Chongqing Guangdong education] National Open University spring 2019 455 logistics practice reference questions
Li Kou today's question -1200 Minimum absolute difference
[untitled] 2022 polymerization process analysis and polymerization process simulation examination
DM8 database recovery based on point in time