Recurrence and analysis of yii2 deserialization vulnerability
Environment construction
The vulnerability is in the version before yii2.0.38. Download version 2.0.37basic
https://github.com/yiisoft/yii2/releases/tag/2.0.37
Modify the value of the / config/web file
Enter php yii serve in the current directory to start
Reappearance
Construct the deserialization entry first
Create a new contro ...
Posted by claypots on Mon, 29 Nov 2021 07:48:07 -0800
Ctfshow web getting started - command execution
web29
The source code is:
<?php
/*
# -*- coding: utf-8 -*-
# @Author: h1xa
# @Date: 2020-09-04 00:12:34
# @Last Modified by: h1xa
# @Last Modified time: 2020-09-04 00:26:48
# @email: h1xa@ctfer.com
# @link: https://ctfer.com
*/
error_reporting(0);
if(isset($_GET['c'])){
$c = $_GET['c'];
if(!preg_match("/flag/i", $c)){
...
Posted by designxperts on Fri, 12 Nov 2021 11:56:51 -0800
2021 CNSS WEB part WP
Web
Signin
At the beginning, Please Change Your Method!, The source code can be obtained by modifying the packet capture method to the POST method
<?php
error_reporting(0);
require_once("flag.php");
if($_SERVER['REQUEST_METHOD'] !=='POST'){
die("Please Change Your Method!");
exit();
}else{
if(!isset($_POST["CNSS"])){
s ...
Posted by hstraf on Thu, 04 Nov 2021 15:14:43 -0700
From a CTF question to HTTP request smuggling attack
preface
Recently, I found an interesting CTF question I did before replying. It is the idea of using the PHP string parsing feature Bypass, but this problem is far more than that. There is another solution, HTTP request smuggling attack.
RoarCTF 2019 Easy Calc
Look at the source code first:
<?php
error_reporting(0);
if(!isset($_GET['num'])) ...
Posted by redzzzon on Tue, 02 Nov 2021 19:44:03 -0700
2021 "Green League Cup" Chongqing University Student Information Security Competition - Light1ng team Writeup
2021 "Green League Cup" Chongqing University Student Information Security Competition - Light1ng team Writeup
For other directions, please refer to pdf:https://wws.lanzoui.com/iWk1ovo0eaj Password: Le1a
Misc
Misc1: check in 1
The title gives a string of base64 codes
Decoded flag:
flag{c54ce9d7b4e17980dd4906d9941ed52a}
Misc2: ...
Posted by sykowizard on Sat, 23 Oct 2021 00:28:09 -0700
[CISCN2019 finals Day2 Web1]Easyweb1
1, Foreword
In previous articles, I mentioned that I have been doing things related to sql injection recently, and I have also been doing problems related to sql injection. However, in fact, many competition questions have different test sites. They often need to combine other knowledge to get the desired results. The following question is the ...
Posted by Magestic on Fri, 22 Oct 2021 01:59:09 -0700
[wangdingbei 2020 rosefinch group]
subject
Link: https://buuoj.cn/challenges#[%E7%BD%91%E9%BC%8E%E6%9D%AF%202020%20%E6%9C%B1%E9%9B%80%E7%BB%84]phpweb
answer
1. Open the web page, a picture and a pair of English will appear. First, F12 view a wave of source code If there is a form and it is submitted by post, then packet capture analysis is required
2. There are two para ...
Posted by brokenshadows on Mon, 18 Oct 2021 19:57:21 -0700
[0CTF 2016]piapiapia BUUCTF detailed writeup
Basic knowledge
Escape principle of php anti sequence words
Problem solving ideas
payload
/www.zip
The source code is leaked and can be downloaded directly
config.php
Open config.php and you can see that the flag may be stored here
Visit / register.php, register an account casually, log in and find that you have jumped t ...
Posted by atl_andy on Wed, 13 Oct 2021 10:59:25 -0700
2021 Hecheng cup pwn part wp
littleof
ret2libc is given for nothing. The first output divulges canary, and the second output divulges the base address of libc. By the way, control the return address, and then return to input, and then get shell (stall)
#!/usr/bin/env python
#coding=utf-8
from pwn import*
sh = remote("182.116.62.85", 27056)
#sh = process('./littleof')
el ...
Posted by JD^ on Sat, 09 Oct 2021 10:51:06 -0700
"CTF Web replication" BUUCTF-[EIS 2019]EzPOP
Utilization point
base64 + filter protocol bypasses death exit
Source code
<?php
error_reporting(0);
class A {
protected $store;
protected $key;
protected $expire;
public function __construct($store, $key = 'flysystem', $expire = null) {
$this->key = $key;
$this->store = $store;
$this ...
Posted by greenie2600 on Thu, 07 Oct 2021 08:22:52 -0700