当前位置:网站首页>Vocational school Panyun network security competition ----- exploration of hidden information
Vocational school Panyun network security competition ----- exploration of hidden information
2022-07-27 22:28:00 【Wangzai sec】
Hidden information exploration
Mission environment description :
- Server scenario :Web20200529
- Server scenario operating system : Unknown ( Close links )
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Find... In the login interface FLAG, And will FLAG Submit ;
Into the F12 see , find Sources Options , Find... In it class.css, Turn down and you'll find it flag

Flag:WELCOME TO CSS!
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Find... In the background of the login interface FLAG, And will FLAG Submit ;
Use burpsuite Capture the login interface , Then find the picture and copy the picture address , stay burpsuite Add the address of the picture to access

Flag:Picturemerge
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Login in the login interface , After the login is successful, find... In the successful interface FLAG And submit ;
Sqlmap A shuttle , Directly explode the database to obtain the account and password 
Sqlmap -u http://172.16.101.250/index.html --forms --level 5 --risk 3 --batch –dbs
First click go Click again follow redirection

Flag:4C6F67696E207375636365737366756C
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , After successful login, find the moon in the page , Decrypt the information in the moon , And will After decryption Information about As FLAG Submit ;
After successful login , Jump to dlc.html page

Click the moon in the upper right corner , Pop up window , Guess it is base64 It's encoded , utilize base64 -d decode


Flag:Base64decryptedsuccessfully
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , After successful login, find the cross star in the page , Download the contents of the page in the cross star , Decrypt the downloaded file , And take the decrypted file content as FLAG Submit ;
utilize Ctrl+A, You can find a star in the lower right corner that can be clicked

Click to download one test.zip file , Then decompress

Extract one test file , One inside. flag.png, Then check it out flag.png

Flag:UF71K2TW5JM88QZ8WMNTWKUY4
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Login in the login interface , After the login fails, find the link in the page, access the connection and download the file , Use the full name of the hidden file as FLAG Submit ;
First click go Click again follow redirection


Access in Google browser treasure.html
Access link , Downloaded a bg.jpg file
utilize steghide Tools to crack pictures , The password is empty. , Get one a.txt file

Flag:a.txt
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Login in the login interface , After the login fails, find the link in the page, access the connection and download the file , Take the contents of the hidden information file in the file as FLAG Submit ;
open a.txt file , See the file header is PNG, This should be a png Pictures of the

Change the suffix to png, Get picture content

- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Look for hidden information on each page , Merge each piece of information in order , As FLAG Submit ;
1:index.html

2:class.css

3:dlc.html


4:treasure.html

Flag:Please check every question
边栏推荐
- ThreadLocal principle and source code analysis (click in step by step, don't recite, learn ideas)
- Learn the use principle and core idea of thread pool from the source code
- Matlab 绘制风速、风向统计玫瑰花图
- [OBS] P B frame loss threshold buffer_ duration_ usec
- Apachespark command execution (cve-2022-33891) vulnerability recurrence
- 什么是私域流量?
- 阿里资深软件测试工程师推荐测试人员必学——安全测试入门介绍
- Are Transformers Effective for Time Series Forecasting?| Pit filling
- [Marine Science] climate indices data set
- cache学习
猜你喜欢

七大排序之直接插入排序

Chapter 3 business function development (choose to export market activities, Apache POI)

CMOS switch (II)_ Parameter extraction

Kubernetes二进制部署——理论部分

High frequency relay

STM32项目分享---MQTT智能门禁系统(含APP控制)

Implementation of arbitrary code execution based on.Net dynamic compilation technology

【无标题】

Relationship between DBM and VPP and Vpeak

项目分析(哪些是it培训给不了)
随机推荐
Leetcode-155-minimum stack
【图解】三次握手,四次挥手 —— 用心看这一篇就够了
项目分析(哪些是it培训给不了)
Uniswap集成sudoswap,能否拉开NFT流动性新序幕?
Reed relay
8000 word explanation of OBSA principle and application practice
只会Excel想做图表可视化,让数据动起来?可以,快来围观啦(附大量模板下载)
Is it safe to open an account online now? Then choose which securities to open a securities account
[stonedb fault diagnosis] MDL lock waiting
Memo mode - unity
软件测试的就业前景到底怎么样?
第八章 通过 REST 使用 Web 会话(Sessions)
CMOS传输门原理及应用
直播app系统源码,上下叠层样式的轮播图
Drawing three coordinate (axis) diagram with MATLAB
Leetcode15 -- sum of three numbers
If demand splitting is as simple as cutting a cake | agile practice
舌簧继电器
极化继电器
九天后我们一起,聚焦音视频、探秘技术新发展