首页
社区
课程
招聘
[原创]2022 KCTF-WEB 出题思路
发表于: 2022-5-1 20:30 10618

[原创]2022 KCTF-WEB 出题思路

2022-5-1 20:30
10618

打开首页显示(我打开的是测试页面)

查看源码得到两个个链接

7b7K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5H3x3g2)9J5k6e0R3&6i4K6u0W2x3e0b7H3i4K6u0W2x3U0l9%4i4K6y4m8z5o6l9@1y4q4)9J5c8Y4m8Z5M7r3W2F1k6X3!0Q4x3X3g2H3K9s2l9`. phpinfo的信息,暂时不知道有什么用


275K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5H3x3g2)9J5k6e0R3&6i4K6u0W2x3e0b7H3i4K6u0W2x3U0l9%4i4K6y4m8z5o6l9@1y4q4)9J5c8Y4g2J5L8q4)9J5k6i4m8Z5M7q4)9K6c8Y4g2J5L8q4)9K6c8r3S2@1N6s2m8K6i4K6y4m8i4K6u0r3i4K6u0r3j5%4c8X3i4K6u0W2M7r3g2V1K9i4W2Q4x3X3g2U0L8$3#2Q4x3V1k6#2M7r3I4G2j5h3c8Q4x3V1k6@1k6h3q4E0i4K6u0r3y4K6j5J5i4K6u0r3N6r3g2S2L8e0t1K6y4U0M7$3x3W2)9J5k6i4m8F1k6H3`.`.

感觉是请求了图片显示在页面,猜测可能有SSRF漏洞


测试065K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5H3x3g2)9J5k6e0R3&6i4K6u0W2x3e0b7H3i4K6u0W2x3U0l9%4i4K6y4m8z5o6l9@1y4q4)9J5c8Y4g2J5L8q4)9J5k6i4m8Z5M7q4)9K6c8Y4g2J5L8q4)9K6c8r3S2@1N6s2m8K6i4K6y4m8i4K6u0r3i4K6u0r3N6%4N6%4i4K6u0W2j5X3q4A6k6s2g2Q4x3X3g2U0L8$3@1`.

返回error,猜测可能限制了域名


测试80fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5H3x3g2)9J5k6e0R3&6i4K6u0W2x3e0b7H3i4K6u0W2x3U0l9%4i4K6y4m8z5o6l9@1y4q4)9J5c8Y4g2J5L8q4)9J5k6i4m8Z5M7q4)9K6c8Y4g2J5L8q4)9K6c8o6p5J5y4#2)9J5k6e0m8Q4x3X3f1H3i4K6u0W2x3g2)9J5c8X3W2F1k6r3g2^5i4K6u0W2M7r3S2H3

返回host is null,搞不清楚什么情况,试试读文件


f02K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5H3x3g2)9J5k6e0R3&6i4K6u0W2x3e0b7H3i4K6u0W2x3U0l9%4i4K6y4m8z5o6l9@1y4q4)9J5c8Y4g2J5L8q4)9J5k6i4m8Z5M7q4)9K6c8Y4g2J5L8q4)9K6c8r3k6A6L8r3g2Q4x3@1q4Q4x3V1k6Q4x3V1k6Q4x3V1k6H3M7X3!0U0i4K6u0r3M7$3g2D9k6W2)9J5c8X3y4%4k6q4)9J5c8Y4g2J5L8q4)9J5k6i4m8Z5M7l9`.`.

返回host is null


通过链接:view-source:0d1K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5H3x3g2)9J5k6e0R3&6i4K6u0W2x3e0b7H3i4K6u0W2x3U0l9%4i4K6y4m8z5o6l9@1y4q4)9J5c8Y4g2J5L8q4)9J5k6i4m8Z5M7q4)9K6c8Y4g2J5L8q4)9K6c8r3k6A6L8r3g2Q4x3@1q4Q4x3V1k6Q4x3V1j5I4x3U0N6Q4x3X3f1H3i4K6u0W2x3q4)9J5k6e0q4Q4x3V1k6H3M7X3!0U0i4K6u0r3M7$3g2D9k6W2)9J5c8X3y4%4k6q4)9J5c8Y4g2J5L8q4)9J5k6i4m8Z5M7l9`.`.

成功读取到代码

原来是使用了curl,同时发现了一个新的被注释掉的地址c57K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8U0p5J5x3#2)9J5k6e0f1%4i4K6u0W2x3U0f1@1i4K6u0W2y4o6u0Q4x3V1k6X3L8r3q4Y4i4K6u0W2M7r3S2H3i4K6t1$3L8X3u0K6M7q4)9K6b7R3`.`.



[培训]科锐逆向工程师培训第53期2025年7月8日开班!

最后于 2022-5-17 12:04 被kanxue编辑 ,原因:
收藏
免费 5
支持
分享
最新回复 (1)
雪    币: 58782
活跃值: (21900)
能力值: (RANK:350 )
在线值:
发帖
回帖
粉丝
2

第四题 飞蛾扑火   
flag{xxx_999()xx*@eeEEE}

最后于 2022-5-17 12:01 被kanxue编辑 ,原因:
2022-5-9 12:03
0
游客
登录 | 注册 方可回帖
返回