当前位置:网站首页>xctf Attack and Defense World Web Master Advanced Zone upload1
xctf Attack and Defense World Web Master Advanced Zone upload1
2022-08-06 03:21:00 【l8947943】
0x01. Enter the environment and check the problem

After uploading the file casually, it is prompted to upload jpg file.That is to say, only upload jpg files. After trying to upload, as shown in the figure: 
You can directly access the address: http://61.147.171.105:50326/upload/1659513440.a.jpg to complete the access to the uploaded content.
0x02. Start doing the question
0x02_1. Problem Analysis
After the upload is successful, we have no other content. The guess is that after the upload is successful, we need to let the uploaded content reveal some content, which is associated with a Trojan horse in PHP.
0x02_2. Solution 1
We create a one-sentence Trojan horse, change its suffix to jpg, open burpsuite to upload and capture the package, as shown in the figure: 
Put it in the repeater, modify the filename to .php, and submit it again, as shown in the figure: 
This picture shows that the Trojan has been uploaded successfully, and the read link is http://61.147.171.105:50326/upload/1659514417.a.php, then use the ant sword tool to connect directly, as shown in the figure: 
Scroll through the content and see: 
After opening, get the final flag, the final answer is: cyberpeace{c5e37ef852170a34ffb889d26c6bad7c}
0x02_3. Solution 2
Using the system command in php, you can directly find the relevant content of the flag, and then check to return the specific content.First construct the payload,
system('find / -name "flag*"'); ?>As shown in the figure:
Then visit the address, directlyEcho the position of the flag.
As you can see, the flag position is at: /var/www/html/flag.php, then use cat to view the specific content, and continue to modify the payload:
system('cat /var/www/html/flag.php'); ?>As shown in the figure:
Visit the link and check backDisplay the content, as shown in the figure: 
Get the final falg answer.
0x02_4. Solution 3
We make the front-end button directly invalid, forcibly upload the php one-sentence Trojan horse file, as shown in the figure, find the upload button, delete disabled directly in the front-end, and press Enter to upload directly, 
After uploading successfully, it will display as shown:
Indicates that the php file is forcibly uploaded successfully, and then use the ant sword to link, the subsequent operations are the same as the second half of the solution.
边栏推荐
- leetcode:1374. 生成每种字符都是奇数个的字符串
- sql server , 两个表,相同字段,相同数据量(5000万), 执行相同的查询,一个表执行的是索引扫描,扫描5000万,耗时2分钟, 另一个表执行的是索引查找,只查找10万,耗时1秒。为什么会有这么大的差别?
- 迟来的初次见面
- KU115 PCIE总线数据预处理板卡(多LVDS接口)
- Harbor offline synchronization
- How to clear the browser cache tutorial
- I understand atomic operations under linux
- 如果一个国家市场效果特别好,我们如何加大这个国家的投放比例。
- firewall and ufw notes
- pcl 点云网络 化 vtk Delaunay 点云网络化
猜你喜欢

LeetCode:623. 在二叉树中增加一行【DFS or BFS】

Literature Reading---Analysis of Genome Haplotypes and Genome Stability and Creeping of Common Bermudagrass Yangjiang

学习MySQL的第二天:SQL(基础篇)

Single player up to 50,000 bonus!The top conference paper recurrence competition is officially launched, and 70+ public tasks are waiting for you to challenge

Mysql安装 求大拿解答

查找链表第N个节点

Lvm root partition expansion

KGAT recommendation system

通行宝通过注册:年营收5.9亿拟募资5.6亿 腾讯云与上汽是股东

【无标题】
随机推荐
学习MySQL的第二天:SQL(基础篇)
运维小白成长记——架构第10周
C 学生管理系统 打印/修改指定位置信息
谷歌广告后台设置的投放语言,如果设置英语,就意味着用的人是使用英语吗?
走!VR技术带你沉浸式看展
BYD's July sales exploded, and the product structure is very reasonable
harbor 离线同步
物联网协议概述
详解 类和对象
文献阅读---普通狗牙根阳江基因组单倍型解析与基因组稳定性和匍匐性研究
日志管理Lombok配置文件
智能合约安全——随机数
Redis持久化存储
2022年阿里云服务器配置选取攻略
django报错 ModuleNotFoundError: No module named 'mysqlclient'
单人最高5万奖金!顶会论文复现赛正式启动,70+公开任务等你挑战
Problems caused by incorrect configuration of hibernate+durid parameters SQLServerException: The server cannot continue to execute the transaction.Description: 10400000001
stacks and queues
预处理(C语言深度了解)
Crypto Bear Market Offers M&A Opportunity Ambitious or Savior?The only truth is that interests come first