当前位置:网站首页>-Web direction attack and defense world
-Web direction attack and defense world
2022-07-05 13:54:00 【Cwxh0125】
The first question is view_source
Title Description :X The teacher asked Xiaoning to check the source code of a web page , But Xiaoning found that the right mouse button seems to be useless
“F12” Look at the source code in the viewer and find flag.
The second question is robots agreement
Title Description :X The teacher said in class Robots agreement , Xiaoning is dozing off in class , Hurry to teach Xiao Ning Robots What is the agreement .
Robots agreement , Also known as the crawler protocol 、 Robot protocol, etc , The whole is called “ Exclusion criteria for web crawlers (Robots Exclusion Protocol)”. Website through Robots The protocol tells search engines which pages to grab , Which pages can't be crawled . It's also Robots There are two ways of using , One is to tell search engines which pages you can't catch ( By default, others can be caught ); One is to tell search engines which pages you can only crawl ( By default, others cannot be caught ).
View the robots.txt file Here's the picture
next Manually open this file that cannot be crawled
Third question . backup
Title Description :X The teacher forgot to delete the backup file , He sent Xiao Ning to find out the backup files , Let's help Xiao Ning !
The suffix of the backup file is .bak
Check the backup file of the modified file /index.php.bak
Open it and you'll see flag
Fourth question cookie
Title Description :X The teacher told Xiao Ning that he was cookie There's something in it , Xiao Ning thought doubtfully :‘ Is that what sandwich biscuits mean ?’
Cookie It's a plain text file saved on the client side . such as txt file . The so-called client is our own local computer . When we use our computer to access web pages through a browser , The server will generate a certificate and return it to my browser and write it to our local computer . This certificate is cookie. Generally speaking cookie All are plain text files written by the server to the client .
Open here cookie Find a cookie.php file open
Fifth question .disabled_button
Title Description :X The teacher talked about the front-end knowledge in class today , Then I give you a button that you can't press , Xiao Ning is surprised to find that the button can't be pressed , How on earth can I press it ?
disabled Property specification should disable input Elements .
Forbidden input Elements are not available , You can't click .
Delete " disable="" " Then you can click the button , After clicking, the effect is as follows
Sixth question .weak_auth
Title Description : Xiaoning wrote a login verification page , Set a password at will .
Investigate the explosion of passwords
Method 1 : Because it is set casually Try some simple passwords
Method 2 : utilize burp Brute force
First, casually lose
use burp Grab the bag
Use a dictionary Brute force
According to the byte length and the returned data Find the password
Question seven .simple_php
Title Description : Xiaoning heard that php Is the best language , So she wrote a few lines after a simple study php Code .
Give to separately a b assignment obtain flag
The eighth question .get_post
Title Description :X The teacher told Xiao Ning that HTTP There are usually two request methods , Do you know which two ?
Use get and post The ginseng
Question 9 .xff_referer
Title Description :X The teacher told Xiao Ning that xff and referer It can be forged .
X-Forwarded-For(XFF) Is used to identify the pass HTTP agent or Load balancing Way to connect to Web The server The most original client IP Address Of HTTP Request header field . Squid Developers of the caching proxy server were the first to introduce this HTTP Header fields , And by the IETF stay HTTP The draft standardization of header fields was formally proposed .
HTTP Referer yes header Part of , When browser towards web The server When the request is sent , Usually with Referer, Tell the server which page is linked from , The server can therefore obtain some information for processing .
According to the topic tips Forgery xff referer utilize burp
use burp forge ip After execution, it is prompted by the arrow Then forge referer
forge referer
obtain flag
Question 10 .webshell
Title Description : Xiaoning Baidu php In a word , It's very interesting , And put it in index.php in
Their thinking : After entering the page, you can see a In a word, Trojans Check the use of the back door Use the ant sword
Connect with an ant sword
When you go in, you can see flag
Eleventh questions .command_execution
Title Description : Xiao Ning wrote a ping function , But didn't write waf,X The teacher told her it was very dangerous , Do you know why .
Web Application protection system ( Also known as : Website Application level intrusion prevention system . english :Web Application Firewall, abbreviation : WAF). utilize The international A generally accepted saying :Web application A firewall It's through the execution of a series of HTTP/HTTPS Of The security policy Come for Web An application that provides protection .------- Baidu Encyclopedia
There is no hint of waf You can try to inject vulnerabilities Inject success
use find Look for The name is flag The file of
find home There is a flag.txt Attempt to read command :cat
Twelfth questions .simple_js( Refer to the answer )
Title Description : Xiaoning found a web page , But I always input the wrong password .(Flag The format is Cyberpeace{xxxxxxxxx} )
First read the source code
Look at two for loop Find out no matter what Will output the wrong password
So the real password should be in the arrow below
First use the string python With the , Get array [55,56,54,79,115,69,114,116,107,49,50],exp as follows .
s="\x35\x35\x2c\x35\x36\x2c\x35\x34\x2c\x37\x39\x2c\x31\x31\x35\x2c\x36\x39\x2c\x31\x31\x34\x2c\x31\x31\x36\x2c\x31\x30\x37\x2c\x34\x39\x2c\x35\x30"
print (s)
Separate the obtained figures ascii Handle , Available string 786OsErtk12,exp
. standard flag Format , available Cyberpeace{786OsErtk12}
边栏推荐
- Solve the problem of invalid uni app configuration page and tabbar
- Solve the problem of "unable to open source file" xx.h "in the custom header file on vs from the source
- [South China University of technology] information sharing of postgraduate entrance examination and re examination
- Network security HSRP protocol
- Scientific running robot pancakeswap clip robot latest detailed tutorial
- Resttemplate details
- PHP character capture notes 2020-09-14
- Routing in laravel framework
- Kotlin collaboration uses coroutinecontext to implement the retry logic after a network request fails
- leetcode 10. Regular Expression Matching 正则表达式匹配 (困难)
猜你喜欢
zabbix 监控
Aikesheng sqle audit tool successfully completed the evaluation of "SQL quality management platform grading ability" of the Academy of communications and communications
What happened to the communication industry in the first half of this year?
What about data leakage? " Watson k'7 moves to eliminate security threats
When using Tencent cloud for the first time, you can only use webshell connection instead of SSH connection.
这18个网站能让你的页面背景炫酷起来
[machine learning notes] several methods of splitting data into training sets and test sets
Interviewer soul torture: why does the code specification require SQL statements not to have too many joins?
锚点导航小demo
Zibll theme external chain redirection go page beautification tutorial
随机推荐
Solution to the prompt of could not close zip file during phpword use
Interviewer soul torture: why does the code specification require SQL statements not to have too many joins?
Log4j utilization correlation
Don't know these four caching modes, dare you say you understand caching?
Brief introduction to revolutionary neural networks
redis6事务和锁机制
Personal component - message prompt
Data Lake (VII): Iceberg concept and review what is a data Lake
Datapipeline was selected into the 2022 digital intelligence atlas and database development report of China Academy of communications and communications
Laravel框架运行报错:No application encryption key has been specified
LeetCode_69(x 的平方根 )
Solve the problem of "unable to open source file" xx.h "in the custom header file on vs from the source
In addition to the root directory, other routes of laravel + xampp are 404 solutions
How to divide a large 'tar' archive file into multiple files of a specific size
The real king of caching, Google guava is just a brother
如何把大的‘tar‘存档文件分割成特定大小的多个文件
Prefix, infix, suffix expression "recommended collection"
Ordering system based on wechat applet
Usage, installation and use of TortoiseSVN
2022 driller (drilling) examination question bank and simulation examination