World web offensive and defensive novice area

Foreword

Ramble: Long time no write blog seriously, and recently various aspects of some confusion, the people are in a state of anxiety every day.

Recently looked at the network attack and defense in this regard, not previously come into contact with, had only computer network, see a primary UP video was "offensive and defensive world," out of curiosity but also point to open the attack and defense in the world , chose the Web novice area, do the process is OK, problem solving has a lot of big brothers wrote blog, so, on this blog is his own summary emmmm.
** If wrong, please enlighten big brother! ! ! Sahua! ! Sahua! ! **

view_source [ Portal ]

topic
Scenes
Said right look at the subject can not be used, so with open F12 developer tools (or Ctrl + U View source), as follows:
Here Insert Picture Description
FIG highlighted position, i.e. the position of the annotation, namely In Flag, cyberpeace} {c77fe8f1b26fb1c86b2a0e474f1a247a

robots [ Portal ]

题目robots
【补充点】robots协议也叫robots.txt(统一小写)是一种存放于网站根目录下的ASCII编码的文本文件,它通常告诉网络搜索引擎的漫游器(又称网络蜘蛛),此网站中的哪些内容是不应被搜索引擎的漫游器获取的,哪些是可以被漫游器获取的。因为一些系统中的URL是大小写敏感的,所以robots.txt的文件名应统一为小写。robots.txt应放置于网站的根目录下。如果想单独定义搜索引擎的漫游器访问子目录时的行为,那么可以将自定的设置合并到根目录下的robots.txt,或者使用robots元数据(Metadata,又称元数据)。
robots协议并不是一个规范,而只是约定俗成的,所以并不能保证网站的隐私。 --------来源:百度百科(侵删致谢)

通俗点说就是告诉访问该网站的爬虫等什么可以爬什么不可以爬,要严格遵守哦!!
topic
Scenes
打开场景什么也没有,所以我们要找robot.txt,在URL处加上,如下图:
Here Insert Picture Description
显示的内容如下图:
User-agent:指定对哪些爬虫生效

Disallow:指定要屏蔽的网址(高亮的地方即屏蔽的网址)所以我们在URL后面加上这个网址
Here Insert Picture Description
下图网址,网页显示即为我们的***flag:cyberpeace{dd39626267d48d2e4c06c08e2c73fd0f}***Here Insert Picture Description

backup【传送门

【补充点】常见的备份文件后缀名有: .git .svn .swp .svn .~ .bak .bash_history
topic
Scenes
根据常用备份文件以及提示,就手动猜测一下后缀,在URL上添加index.php.bak:即下图:
flag在图中倒数第四行:***Cyberpeace{855A1C4B3401294CB6604CCC98BDE334}***Here Insert Picture Description

cookie【传送门

topic
Scenes
看到cookie
[补充点]Cookies"是指服务器暂存放在你的电脑里的txt格式的文本文件资料,主要用于网络服务器辨别电脑使用。
首先F12,如下图:网络(谷歌浏览器是network吧)
Here Insert Picture Description
接下来:下图点击左侧高亮处出现右侧,在请求头中找到cookie:显示Cookie
look-here=cookie.php,那我们接下来继续全看cookie.php在URL后面加上
Here Insert Picture Description
URL后面加/cookie.php即下图显示:让看响应头,即右侧flag:
cyberpeace{221cee1aa4f9d5a3fb47f3aaff5620b0}
Here Insert Picture Description

disabled_button【传送门

topic
Scenes
确实按不动的按钮,所以应该想到改一下代码,F12:如下图高亮处
Here Insert Picture Description
将其中的disable变成enable即可。
Here Insert Picture Description
按钮可以按了就按下去:嗯在查看器里面就出现flag了
cyberpeace{3e60686f3c9a3b50a7954dcc08052f30}

weak_auth【传送门

topic
Scenes
需要借助burpsuit,下载
随便输入用户名和密码,提示如下图:即让你用户名没admin
Here Insert Picture Description
接下来就是破解密码了,抓包,爆破(具体步骤看下面截图,使用Burpsuite的教程大家百度一下吧)
Here Insert Picture Description
Here Insert Picture Description
Here Insert Picture Description
Here Insert Picture Description
如上图,可见123456与其他的长度不一样。
输入密码可得flag:cyberpeace{689c4592587c7f7846ac96201b678046}
Here Insert Picture Description

未完待续……

还有六道,写一下:

simple_php

Here Insert Picture Description
Here Insert Picture Description
看场景中的代码可分析出,a==0并且不能是0,所以我们就用“0”来表示
b要大于1234且不能都是数字,所以就用1235a来表示,然后通过get方法,在URL后面加上/?a=“0”&b=1235a,如下图:flag:
Cyberpeace{647E37C7627CC3E4019EC69324F66C7C}
Here Insert Picture Description

get_post

Here Insert Picture Description
Here Insert Picture Description
根据场景中的要求通过get方式提交a=1,直接在URL后面加上/?a=1,如下图
Here Insert Picture Description
又让用post方式b=2,我们班借助Hackbar,如下图:
Here Insert Picture Description
运行:如下图
Here Insert Picture Description
flag:cyberpeace{9481771d16d07348e8ffe8b3a0cd3c8d}

xff_referer

Here Insert Picture Description
Here Insert Picture Description
我们需要借助Burpsuite,点击图中高亮处,发送过去
Here Insert Picture Description
XFF(X-Forwarded-For)设置成123.123.123.123,如下图高亮处:点击GO
Here Insert Picture Description
看下图中右侧的高亮处:提示必须来自谷歌
Here Insert Picture Description
所以我们把refer设置为:下图左侧高亮处:
Here Insert Picture Description
得到:
Here Insert Picture Description
flag:cyberpeace{5d71de5f6822a0baf3f0814eccaabea0}

webshell

Here Insert Picture Description
Here Insert Picture Description
需要借助蚁剑(或者菜刀)
打开蚁剑,添加数据
Here Insert Picture Description
填上网址和密码,看场景中这是一句话木马
Here Insert Picture Description
然后添加成功:
Here Insert Picture Description
右击文件管理:把flag.txt下载下来
Here Insert Picture Description
Here Insert Picture Description
flag:cyberpeace{229c88d007e57190c372c38019d09bec}

command_execution

Here Insert Picture Description
Here Insert Picture Description
看场景和题目说什么危险,然后想到访问本地:127.0.0.1
Here Insert Picture Description
访问成功,然后试试“ls”
Here Insert Picture Description
得到:
Here Insert Picture Description
还是成功,然后找一下txt文件
得到所有txt,第一个就是flag.txt
Here Insert Picture Description
然后我们访问flag.txt
Here Insert Picture Description
找到flag
Here Insert Picture Description
flag:cyberpeace{383c97eae1ea2cbbfe9ce5653a5ce870}

simple_js

Here Insert Picture Description
Here Insert Picture Description
This question I'm very irritable, ctrl + U to see the source code:
Here Insert Picture Description
look at the above string of numbers: converted into ASCII (write a python script)
Here Insert Picture Description
output ::: FAUX PASSWORD HAHA
quite speechless ......
then look at the scene below one pair of hex to decimal first See:
Here Insert Picture Description
Yield: 55,56,54,79,115,69,114,116,107,49,50
then he converted into ASCII
Here Insert Picture Description
obtained:
786OsErtk12
according to the title of the format flag:
Cyberpeace} {xxxxxxxxx
Cyberpeace {786OsErtk12}


Finished !!!

Published 42 original articles · won praise 19 · views 10000 +

Guess you like

Origin blog.csdn.net/qq_41233643/article/details/104330961