CTFshow - getting started with web - information collection web1-web20 wp

web1

Development comments were not deleted in time

f12 gets flag

image-20230705233702121

web2

js front desk interception === invalid operation

It shows that the source code cannot be viewed, neither f12 nor the right mouse button works. You can choose here burp抓包, or you can choose to ctrl+uview it directly.

image-20230705235014347

web3

When you have no idea, grab a bag and take a look, you may get unexpected results.

This time f12 has nothing. Try using burp to grab a package.

image-20230705235452661

Get the flag, the flag is in the response header

image-20230705235603350

web4

There are always people who write the backend address into robots to help lead the way for the big guys.

The question starting interface is the same as the previous question. Although the question has hints, robotssometimes the questions often do not give hints, so scan it with dirsearch first.

image-20230706001036012

There is a file in the scan /robots.txt, and then I go to access it and it shows that there is /flagishere.txta file.

image-20230706001154597

Access /flagishere.txtthe file and get the flag

web5

PHP source code leaks can sometimes help

There is still nothing with f12, and dirsearch can’t find anything.

image-20230706002106748

According to the title hint, phpsthe source code is leaked. When accessing, /index.phpsa file will be downloaded. After viewing the content, the flag will be obtained.

image-20230706003004455

web6

Unzip the source code to the current directory, test normally, and call it a day.

image-20230711001406862

The guess is that /www.zipyou directly access the downloaded file and get the flag.

image-20230711001506593

web7

Version control is important, but not deploying to production is even more important.

Didn't get anything from the packet capture

image-20230711103254667

Scan dirsearch and find that /.git源码泄露you can get the flag after accessing it.

image-20230711103513468

web8

Version control is important, but not deploying to production is even more important.

Same as the previous question, burp can’t catch it, so just use dirsearch to scan it.

I scanned /.svnthe file and got the flag after accessing it.

image-20230711104247358

web9

Found a typo on a web page? Quickly change it in vim in the production environment. No, it crashed.

I scanned dirsearch directly, but there was nothing.

image-20230711110537282

There is nothing in burp packet capture.

image-20230711110518611

You can only access it according to hint, hint prompt vim缓存泄露, index.php.swppayload:

http://b1aecb15-06c9-48a7-996e-06bfe79cab32.challenge.ctf.show/index.php.swp

A file will be downloaded and opened with Notepad to get the flag.

image-20230711110716831

web10

A cookie is just a cookie and cannot store any private data

Burp captures the packet and finds that the flag is in the cookie. Just decode the url.

image-20230711111629680

web11

In fact, domain names can also hide information. For example, flag.ctfshow.com hides a piece of information.

Website using domain name resolution records: Domain name resolution record online query tool: Nslookup detects real domain name resolution records

You can see the txt record and get the flag

image-20230711131756022

web12

Sometimes the public information on the website is the administrator’s commonly used passwords.

After entering the environment, use dirsearch to scan (I don’t know why I only scan one file per second, which is difficult to find)

image-20230711134748113

Access /admin, prompt for account and password, but username and password are required

image-20230711134206113

The account number is admin, and the password is according to the public information on the website described in the title.372619038

image-20230711134937888

Get flag after logging in

web13

Do not include sensitive information in technical documents, and promptly change the default password after deployment to the production environment.

I scanned it with dirsearch first, but found nothing useful.

Scroll down the website, see it document, and click on it

image-20230711135637399

Slide the document down

image-20230711135843072

Go to visit /system1103/login.php, user admin, admin1103get the flag after successful login with password

web14

Sometimes important (editor) information can be inadvertently leaked in the source code, and the default configuration can kill people.

The old rule is to scan it with dirsearch first.

You can scan it out editor, visit it, reach the editing interface, and then click these two buttons.

image-20230711142034576

The flag can be found through the file space,var->www->html->nothinghere->fl000g.txt

image-20230711142119183

Construct the payload to access the file

http://8c753168-a6de-4c82-9253-4b8580dc83e2.challenge.ctf.show/nothinghere/fl000g.txt

web15

Public information, such as email addresses, may cause information leakage and have serious consequences.

Scan /adminthe path with dirsearch, visit it, forget the password

image-20230711144323677

If you need to know his city, scroll to the bottom of the website and there is a QQ mailbox. QQ add this QQ number.

At first I thought it was an email check, pure clown

image-20230711144545898

Add a friend, 在西安,

Fill in Xi'an and the password has been reset.

image-20230711164548171

Log in, account number admin, password is admin7789, get flag

web16

For test probes, they must be deleted promptly after use, which may cause information leakage.

Dirsearch can't scan anything, and packet capture can't find anything either.

Hint shows that it is 探针, and the default file of the probe is tz.phpto access it.

image-20230711170555294

You can view phpinfo from here

image-20230711170653216

web17

Backup sql files can reveal sensitive information

dirseach scannedbackup.sql

image-20230711171625132

A file will be downloaded, open it and get the flag

image-20230711171803854

web18

Don't be anxious, rest, take a rest, play 101 points to give you the flag

f12 view source code

image-20230711172621786

You can know that this is unicodeencryption, decrypt it

image-20230711172842552

Access 110.phpto get flag

image-20230711172921397

web19

Don’t put keys or anything like that on the front end.

f12 View the source code and find the key

image-20230711174042395

We need our username and adminpassword to be encrypted a599ac85a73384ee3219fa684296eaa62667238d608efa81837030bd1ce1bf04, then look at the encrypted code

Through the code we can know thatAES加密

image-20230711174216500

If we want to decrypt, we need AES 加密模式, 填充, 密码, 偏移量, 输出, which are all given in the code.

image-20230711174423641

key=0000000372619038It's the password, iv = ilove36dverymuchit's the offset, 16位字符串it tells us it's the output, CBCit's the pattern, ZeroPaddingit's the padding, it's the online decryption

image-20230711174559858

The password is i_want_a_36d_girl(can this really be said), account number admin, log in and get the flag

web20

dirsearch didn't scan anything, and burp couldn't catch anything either.

But there is nothing in scanning this directory. It does not mean that there is nothing in other directories. From the scan results, you can see that there is another /db/directory .

image-20230711175754078

Scan /db/the directory and see /dn.mdbfiles

image-20230711175844853

Visit it and db.mdbthe file will be downloaded. After opening it, search for flag using ctrl+f.

image-20230711180040188

Guess you like

Origin blog.csdn.net/Leaf_initial/article/details/131666162