当前位置:网站首页>Vocational school Panyun network security competition ----- exploration of hidden information
Vocational school Panyun network security competition ----- exploration of hidden information
2022-07-27 22:28:00 【Wangzai sec】
Hidden information exploration
Mission environment description :
- Server scenario :Web20200529
- Server scenario operating system : Unknown ( Close links )
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Find... In the login interface FLAG, And will FLAG Submit ;
Into the F12 see , find Sources Options , Find... In it class.css, Turn down and you'll find it flag

Flag:WELCOME TO CSS!
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Find... In the background of the login interface FLAG, And will FLAG Submit ;
Use burpsuite Capture the login interface , Then find the picture and copy the picture address , stay burpsuite Add the address of the picture to access

Flag:Picturemerge
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Login in the login interface , After the login is successful, find... In the successful interface FLAG And submit ;
Sqlmap A shuttle , Directly explode the database to obtain the account and password 
Sqlmap -u http://172.16.101.250/index.html --forms --level 5 --risk 3 --batch –dbs
First click go Click again follow redirection

Flag:4C6F67696E207375636365737366756C
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , After successful login, find the moon in the page , Decrypt the information in the moon , And will After decryption Information about As FLAG Submit ;
After successful login , Jump to dlc.html page

Click the moon in the upper right corner , Pop up window , Guess it is base64 It's encoded , utilize base64 -d decode


Flag:Base64decryptedsuccessfully
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , After successful login, find the cross star in the page , Download the contents of the page in the cross star , Decrypt the downloaded file , And take the decrypted file content as FLAG Submit ;
utilize Ctrl+A, You can find a star in the lower right corner that can be clicked

Click to download one test.zip file , Then decompress

Extract one test file , One inside. flag.png, Then check it out flag.png

Flag:UF71K2TW5JM88QZ8WMNTWKUY4
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Login in the login interface , After the login fails, find the link in the page, access the connection and download the file , Use the full name of the hidden file as FLAG Submit ;
First click go Click again follow redirection


Access in Google browser treasure.html
Access link , Downloaded a bg.jpg file
utilize steghide Tools to crack pictures , The password is empty. , Get one a.txt file

Flag:a.txt
- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Login in the login interface , After the login fails, find the link in the page, access the connection and download the file , Take the contents of the hidden information file in the file as FLAG Submit ;
open a.txt file , See the file header is PNG, This should be a png Pictures of the

Change the suffix to png, Get picture content

- Via local PC Medium penetration test platform Kali For the server scenario Web20200529 Visit the web site in , Look for hidden information on each page , Merge each piece of information in order , As FLAG Submit ;
1:index.html

2:class.css

3:dlc.html


4:treasure.html

Flag:Please check every question
边栏推荐
- EC code introduction
- fork()函数的执行过程、孤儿进程和僵尸进程
- Chapter 3 business function development (choose to export market activities, Apache POI)
- 【图解】三次握手,四次挥手 —— 用心看这一篇就够了
- Leetcode-152- product maximum subarray
- Leetcode-309- best time to buy and sell stocks, including freezing period
- redis学习
- ThreadLocal principle and source code analysis (click in step by step, don't recite, learn ideas)
- Open source data quality solution -- Apache Griffin primer
- Project analysis (what is it training that can't be given)
猜你喜欢

JVM memory model interview summary

【无标题】

Regular expression exercise

只会Excel想做图表可视化,让数据动起来?可以,快来围观啦(附大量模板下载)

vs2019 release模式调试:此表达式有副作用,将不予计算。

一种比读写锁更快的锁,还不赶紧认识一下

刚培训完的中级测试工程师如何快速度过试用期

What is the employment prospect of software testing?

基于MCU的二维码生成及在墨水屏上进行二维码显示

Implementation of arbitrary code execution based on.Net dynamic compilation technology
随机推荐
[numerical analysis exercise] Jacobi iteration method of third-order matrix
软件测试的就业前景到底怎么样?
Reentranlock and source code analysis (learn ideas and click the source code step by step)
Deploy dolphin scheduler high availability cluster based on rainbow
温度继电器
Interview question: what are the functions of fail safe mechanism and fail fast mechanism
Polarization relay
Leetcode-39-total number of combinations
Are Transformers Effective for Time Series Forecasting?|填坑
【StoneDB故障诊断】系统资源瓶颈诊断
一种比读写锁更快的锁,还不赶紧认识一下
SQL注入 Less26a(布尔盲注)
七大排序之直接插入排序
2022 2nd cyber edge cup cyber security competition Web
C language output teaching calendar
Inertial navigation principle (VII) -imu error classification (II) -allan variance analysis method +imu test + calibration introduction
阿里资深软件测试工程师推荐测试人员必学——安全测试入门介绍
Cloud native microservices Chapter 3: haproxy+kept
Excel only wants to visualize charts and make data move? Yes, come and watch (with a large number of templates to download)
【OBS】P B 丢帧阈值 buffer_duration_usec