当前位置:网站首页>[CTF] AWDP summary (WEB)
[CTF] AWDP summary (WEB)
2022-07-05 01:14:00 【Sunlight_ three hundred and sixteen】
Catalog
【CTF】AWDP summary (Web)
What is? adwp?
AWDP It is a comprehensive assessment of team attack 、 Defense technology capability 、 The game mode of both attack and defense with real-time strategy . Each team is an attacker and a defender , Fully reflect the actual combat of the game 、 Real time and confrontation , Comprehensively consider the penetration ability and protection ability of the participating team .
In the game , Each team has the same virtual target machine , Team members should be responsible for GameBox attack , And submit the correct flag( Prove that you have the ability to attack the problem ); in the meantime , The platform launches an attack on the target aircraft of the team in a round system , Check whether the vulnerabilities of other players are successfully repaired , If the repair is successful, it is considered that the team has the defense ability of the vulnerability .
The scoring rules are as follows : During the competition, each team has the same starting score (10000 branch ), Score by the end of the game , Score as each team , From high to low in the ranking .
The participating team can obtain points in the following two ways :
1) Conquered : Submit GameBox Stored in flag;
2) defense : Successfully defend the attack of the platform on each target , And the service is normal .
At the same time, they will lose points in the following two ways :
1) Service exception : The team cannot maintain a GameBox The normal service of , Platform inspection failed ;
2) Violations, : The referee awarded a penalty for violating the competition discipline and discovering violations .
Six states
– Attacked , It means that this question has been typed , Delivered flag, The attack is successful . The attack process is actually ordinary ctf. Some topics will first give you all the source code for you to type , This is the white box , But there are still many problems in the white box. The defense is successful, but it can't be solved flag ha-ha . You can only type some questions in black box flag coming , The successful attack will give you the source code , Let you defend .
– Defended , After you get the source code , Put the vulnerability of this problem through modifying the source code , It has been completed , The referee's poc I can't solve this problem , Even if the defense is successful .
– Abnormal defense , Explain the process of defense , You have lost the services that the website should provide , It may be over defense , Or you may have deleted the key functions . If the defense is abnormal , Be sure to reset the environment at the first time , Otherwise, points will be deducted after the end of a round , The deduction of points is particularly hurt .
defense
Prepare for the game
1. Be fully prepared before the game , Put some loopholes waf All ready , for example :
function wafrce($str){
return !preg_match("/openlog|syslog|readlink|symlink|popepassthru|stream_socket_server|scandir|assert|pcntl_exec|fwrite|curl|system|eval|assert|flag|passthru|exec|chroot|chgrp|chown|shell_exec|proc_open|proc_get_status|popen|ini_alter|ini_restore/i", $str);
}
function wafsqli($str){
return !preg_match("/select|and|\*|\x09|\x0a|\x0b|\x0c|\x0d|\xa0|\x00|\x26|\x7c|or|into|from|where|join|sleexml|extractvalue|+|regex|copy|read|file|create|grand|dir|insert|link|server|drop|=|>|<|;|\"|\'|\^|\|/i", $str);
}
function wafxss($str){
return !preg_match("/\'|http|\"|\`|cookie|<|>|script/i", $str);
}
these waf It's a little crude , It's because we should ensure that the environment of the topic can't go wrong , The topic should provide normal services .
This is very important, very important , Directly decide whether you can quickly win the defense of the problem .
2.XFTP
The file upload tool should be ready
download :
link :https://pan.baidu.com/s/1eabfwy7b8TlM-0fquWAYxw
Extraction code :g32d
3.phpstudy etc. web Environmental Science
Configure local web Environmental Science , The more convenient, the better , Namely After getting the source code, you should be able to run locally very quickly , Don't be in a hurry when it comes to the game , All of a sudden, the domain name went wrong, and all of a sudden, the database went wrong . In the game , Time is minutes !!
4. Code audit tools
Seay Source code audit system and so on .
It can play an auxiliary role , Not very important .
For the first time waf
about awdp Come on , Defense is far more important than attack , Because it is a rotation system , Each round of successful defense or attack will add corresponding points , The more successful people , The less points you add in each round , And points are cumulative ,** There are fewer questions , I won't deduct the points I got before .** So time is particularly important . Some people's questions have just appeared 5 Defense succeeded in minutes , I've been eating a problem for a whole day , Add... From the first round 500 Add to the last round 50, It adds up to thousands of points .
So our strategy is , One topic , First analyze the general knowledge points , Command execution ?sql Inject ? Upload files ? then Add... To the source code at the first time waf.
waf The form of is not limited to the example shown above , Filter keywords , It can also be directly to input things Length limit , For example, limit the length of input and execution commands to less than 2. It can achieve the purpose of repairing the loopholes without damaging the problem environment . But it also depends on the specific topic , Some topics may be shorter than 2 It's destroying web Service led to defense failure .
Pay attention to the path of file upload
This question is very important !!!
During defense, we need to upload the files to be repaired to the server , Replace the file in the original server , So we need to know the specific path of the file , But generally speaking, the topic will not be given directly , The directories of different development languages and frameworks are also different .
This time we need a small tips:
Give examples :
mv -f explorer.php /www/html/
The file we want to replace is probably not in the root directory /www/html, So this example is chicken ribs
Then look in the root directory :
mv -f explorer.php $(dirname `find / -name 'explorer.php' 2>/dev/null`)/explorer.php
use find The command looks up the root directory named explorer.php
The file of , Then return his pathname (dirname)
2>/dev/null
The function of is to avoid returning some wrong information , For example, the search process will return errors such as insufficient permissions .
attack
There is nothing to say about attacks , Just fight ctf, Some questions are white boxes , You have to type out some questions first flag Only then has the source code .
That's all I thought of for the moment , It took so long to record , Because I have been taking exams .
Here's a tribute to the studio bosses who took me to fight awdp!
边栏推荐
- 107. Some details of SAP ui5 overflow toolbar container control and resize event processing
- Global and Chinese market of network connected IC card smart water meters 2022-2028: Research Report on technology, participants, trends, market size and share
- Expansion operator: the family is so separated
- Daily question brushing record (13)
- BGP comprehensive experiment
- Getting started with Paxos
- [development of large e-commerce projects] performance pressure test - Optimization - impact of middleware on performance -40
- Global and Chinese market of nutrient analyzer 2022-2028: Research Report on technology, participants, trends, market size and share
- Implementation steps of master detail detail layout mode of SAP ui5 application
- Visual explanation of Newton iteration method
猜你喜欢
Take you ten days to easily complete the go micro service series (IX. link tracking)
SAP UI5 应用的主-从-从(Master-Detail-Detail)布局模式的实现步骤
揭露测试外包公司,关于外包,你或许听到过这样的声音
SAP UI5 应用开发教程之一百零六 - 如何提高 SAP UI5 应用路由 url 的可读性试读版
Poap: the adoption entrance of NFT?
Basic operations of database and table ----- create index
Basic operation of database and table ----- the concept of index
微信小程序:微群人脉微信小程序源码下载全新社群系统优化版支持代理会员系统功能超高收益
[wave modeling 3] three dimensional random real wave modeling and wave generator modeling matlab simulation
dotnet-exec 0.6.0 released
随机推荐
Implementation steps of master detail detail layout mode of SAP ui5 application
Applet live + e-commerce, if you want to be a new retail e-commerce, use it!
Take you ten days to easily complete the go micro service series (IX. link tracking)
Innovation leads the direction. Huawei Smart Life launches new products in the whole scene
创新引领方向 华为智慧生活全场景新品齐发
The most complete regular practical guide of the whole network. You're welcome to take it away
[untitled]
Expose testing outsourcing companies. You may have heard such a voice about outsourcing
Summary of the function and usage of const, volatile and restrict
微信小程序;胡言乱语生成器
[Chongqing Guangdong education] National Open University spring 2019 1042 international economic law reference questions
Nebula Importer 数据导入实践
I was beaten by the interviewer because I didn't understand the sorting
Database postragesql client connection default
Query for Boolean field as "not true" (e.g. either false or non-existent)
A simple SSO unified login design
107. Some details of SAP ui5 overflow toolbar container control and resize event processing
Getting started with Paxos
[FPGA tutorial case 9] design and implementation of clock manager based on vivado core
Call Huawei order service to verify the purchase token interface and return connection reset