没有合适的资源?快使用搜索试试~ 我知道了~
网络攻防平台writeup 1
Web安全基础: 4
1、信息泄露: 4
2、暴力破解: 5
3、SQL注入: 5
4、文件上传: 5
5、XSS: 5
6、鉴权绕过: 6
7、文件包含: 6
8、验证码1.0: 6
9、headers: 6
10、Limited access: 7
11、XML PATH: 8
加解密技术: 9
1、解密1: 9
2、解密2: 9
3、古典现代: 9
4、ZIP解密: 9
5、RSA挑战: 10
6、古典密码1.0: 11
7、古典密码2.0: 12
8、密码算法破解: 13
9、base解码: 14
10、AES-CBC: 15
11、RSA解密3: 17
![](https://csdnimg.cn/release/download_crawler_static/87764716/bg1.jpg)
网络攻防平台 writeup
目录
网络攻防平台 writeup...........................................................................................1
Web 安全基础:...................................................................................................4
1、信息泄露: .................................................................................................4
2、暴力破解: .................................................................................................5
3、SQL 注入:..................................................................................................5
4、文件上传: .................................................................................................5
5、XSS:............................................................................................................5
6、鉴权绕过:..................................................................................................6
7、文件包含:..................................................................................................6
8、验证码 1.0: ...............................................................................................6
9、headers: ...................................................................................................6
10、Limited access: ......................................................................................7
11、XML PATH: ................................................................................................8
加解密技术:.......................................................................................................9
1、解密 1:......................................................................................................9
2、解密 2:......................................................................................................9
3、古典现代:..................................................................................................9
4、ZIP 解密: ..................................................................................................9
5、RSA 挑战:.................................................................................................10
6、古典密码 1.0: ..........................................................................................11
7、古典密码 2.0: ..........................................................................................12
8、密码算法破解: .........................................................................................13
9、base 解码: ...............................................................................................14
10、AES-CBC:................................................................................................15
11、RSA 解密 3:.............................................................................................17
![](https://csdnimg.cn/release/download_crawler_static/87764716/bg2.jpg)
12、Bit 纠错: ...............................................................................................18
13、RSA4:.....................................................................................................19
14、密钥交换: ..............................................................................................20
15、ECC Basic:.............................................................................................21
日志分析: ........................................................................................................22
1、流量分析:................................................................................................22
2、安全日志分析: .........................................................................................22
3、无线破解:................................................................................................22
4、注入流量:................................................................................................23
5、注入日志:................................................................................................24
6、扫描包分析: ............................................................................................25
安全编程: ........................................................................................................26
1、编程基础:................................................................................................26
2、快速脚本:................................................................................................26
3、快速解密(socket): ..................................................................................27
4、简单算法:................................................................................................27
5、hash 破解 :..............................................................................................28
6、大数据运算: ............................................................................................28
7、海量验证码: ............................................................................................29
8、解密脚本:................................................................................................30
9、计算有多快: ............................................................................................31
信息隐写: ........................................................................................................31
1、图片中有什么: .........................................................................................31
2、图片中的秘密: .........................................................................................31
3、中级隐写(含解密): ...............................................................................31
4、像素中的秘密: .........................................................................................32
5、白噪声: ...................................................................................................34
6、另一种隐写: ............................................................................................34
![](https://csdnimg.cn/release/download_crawler_static/87764716/bg3.jpg)
7、图像的背后: ............................................................................................35
8、白噪声 2: ................................................................................................37
9、不动声色:................................................................................................38
Web 安全进阶:.................................................................................................38
1、PHP 代码审计: .........................................................................................38
2、web 高级代码审计: ..................................................................................38
3、PHP 代码绕过: .........................................................................................39
4、PHP 代码审计 2.0:....................................................................................40
5、SQL 注入进阶: .........................................................................................41
6、重置密码:................................................................................................41
7、芒果: ......................................................................................................42
8、SALT:......................................................................................................42
9、变量覆盖:................................................................................................43
10、验证码 2.0:............................................................................................44
11、信息泄露进阶: .......................................................................................44
12、Numbers: ..............................................................................................46
13、盲注: ....................................................................................................47
14、Injection: ..............................................................................................48
15、文件上传进阶: .......................................................................................48
16、Injection2:.............................................................................................49
17、bypass&sqlinjection:...............................................................................50
MISC .................................................................................................................52
1、 卡安全: ..................................................................................................52
2、数据恢复:................................................................................................52
3、星号密码:................................................................................................57
4、ShellCode:...............................................................................................57
5、数学公式:................................................................................................58
6、Regex:....................................................................................................58
![](https://csdnimg.cn/release/download_crawler_static/87764716/bg4.jpg)
7、NFC 进阶:................................................................................................59
8、Bad Git: ..................................................................................................59
逆向:...............................................................................................................60
1、小试牛刀:................................................................................................60
2、跳转条件:................................................................................................61
3、算法逆向:................................................................................................62
4、DotNet 逆向: ...........................................................................................63
5、安卓逆向:................................................................................................65
6、数学分析:................................................................................................69
7、PYC 分析:................................................................................................70
8、逆向解密:................................................................................................72
9、ELF 逆向: ................................................................................................73
10、Js 解码:.................................................................................................77
11、ELF 逆向 2:............................................................................................78
溢出(Pwn): ....................................................................................................79
1、Pwn 基础: ...............................................................................................79
2、ROP 基础: ...............................................................................................80
3、猜测 100::...............................................................................................81
4、 INPUT:...................................................................................................82
5、EasyPwn: ................................................................................................83
Web 安全基础:
1、信息泄露:
Task:
秘密藏在哪里...
url: /tasks/web1.php
根据提示得知本目录下可能存在备份文件,常见的备份包括 file~,file.bak,.file.swp
等,在 url 输入 :
http://URL/tasks/web1.php.bak
查看源代码,获得 key。
![](https://csdnimg.cn/release/download_crawler_static/87764716/bg5.jpg)
2、暴力破解:
Task:
输入正确的密码...
url: /tasks/web2.php
从源码中获得密码表,注意提交的密码要计算 md5 值后提交,用 burpsuit 爆破。
3、SQL 注入:
Task:
SQL 注入得到想要的...
url: /tasks/web3.php
源代码给出了注入的过滤过程:
$check=
eregi('select|insert|update|delete|from|or|and|=|\/\*|\*|\.\.\/|\.\/|union|into
|load_file|outfile', $pass);
说明以上 eregi 方法内的关键字被过滤,需要找出替代方法,万能密码公式:
' or '1'='1
or 可以用||替代(and 用&&);逻辑'1'='1 因为=过滤,所以找出一种不用等号的逻辑公
式,例如:'a'<'t 或者'sw'
IN 'swod'等等,即:
')||('a'<'t
输入,发现已经绕过了这个过滤,读代码,发现判断 SQL 结果集只能有 1 条并且
username=admin,所以我们增加条件:
')||('a'<'t')&&(username like 'admin
或')||username in ('admin
获得 key.
xx') || 'a'<'b' && (username like 'admin
4、文件上传:
Task:
文件上传也存在漏洞...
url: /tasks/web4.php
通过上传测试,得知文件上传防御使用了服务器端扩展名检测、类型检测。以下几种绕过
方案均无效:
%00 截断;1.asp;.jpg;1.JpG;1.php.hehe;
本题的要点在于利用上传路径 00 截断绕过,如:
filename='another.jpg'
filepatch='un.php(0x00).jpg'
则 filename 绕过了测试,而在拷贝时,最终生成的地址可能为:
C:\\XXXX\un.php(0x00).jpg/another.jpg
由于可能调用底层的 C 语言应用,碰到 0x00 会发生截断,最后保存地址为:
C:\\XXXX\un.php
5、XSS:
Task:
跨站脚本,弹出框...
url: /tasks/web5.php
通过调试工具知道 xss 过滤是客户端过滤,所以直接用调试器的控制台进行输入 alert(1)
即可弹窗。也可构造”><svg/onload=alert(1)//<!—也可注入 xss
剩余82页未读,继续阅读
资源推荐
资源评论
![](https://csdnimg.cn/release/downloadcmsfe/public/img/starY.0159711c.png)
156 浏览量
![](https://csdnimg.cn/release/downloadcmsfe/public/img/starY.0159711c.png)
130 浏览量
188 浏览量
![](https://csdnimg.cn/release/downloadcmsfe/public/img/starY.0159711c.png)
149 浏览量
![](https://csdnimg.cn/release/downloadcmsfe/public/img/starY.0159711c.png)
176 浏览量
199 浏览量
104 浏览量
188 浏览量
资源评论
![avatar-default](https://csdnimg.cn/release/downloadcmsfe/public/img/lazyLogo2.1882d7f4.png)
![avatar](https://profile-avatar.csdnimg.cn/f6cefb18bbd44012a4817b68386982f5_no_name_cao_ni_mei.jpg!1)
usp1994
- 粉丝: 6264
- 资源: 1049
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助
![voice](https://csdnimg.cn/release/downloadcmsfe/public/img/voice.245cc511.png)
![center-task](https://csdnimg.cn/release/downloadcmsfe/public/img/center-task.c2eda91a.png)
最新资源
- FPGA远程网口TCP升级的自动化方案研究与应用,FPGA远程网口TCP升级:智能升级新方案与实践,Fpga 远程网口tcp升级 ,FPGA; 远程网口; TCP升级; 固件更新,FPGA远程网口TC
- 高斯过程回归GPR在Matlab平台下的时序预测与评估:单输入输出模型及其实用指南,高斯过程回归GPR算法:单输入输出时序预测模型详解与实战,Matlab实现平台,中文字符注释助力科研新手快速上手,高
- 乱七八糟ahbsram,copy other
- 灰色预测算法:基于灰色预测模型的数学建模与Matlab代码实现,灰色预测算法:基于灰色预测模型的数学建模与Matlab代码实现,预测算法一:灰色预测模型 灰色预测是对含有已知信息又含有不
- 【HarmonyOS Next】图片选择方案添加图片文件
- 永磁同步电机新型无感控制策略及转子位置估计研究:正弦波注入与高频脉冲注入策略的MATLAB仿真探讨,永磁同步电机无感控制策略与高频脉冲注入转子位置估计策略的MATLAB仿真研究,永磁同步电机基于正弦波
- 51单片机技术参考资源
- zijishangchuande verilog
- 图像识别项目源码JAVA
- 基于Comsol软件的激光熔覆熔池流动数值模拟:考虑马兰戈尼对流与S活性元素影响下的熔池驱动力及表面张力系数变化,基于Comsol软件的激光熔覆熔池流动数值模拟:考虑马兰戈尼对流与S活性元素影响下表面
- RTLAB实验图:半实物仿真平台下的仿真波形转实验波形与电力电子实验波形解析,RTLAB实验图:半实物仿真平台下的仿真波形与实验波形转换研究,RTLAB实验图,半实物仿真平台,截图波形转示波器波形,仿
- NPC三电平逆变器改进同步载波调制算法:优化输出电压谐波与共模电压性能仿真研究,NPC三电平逆变器改进同步载波调制算法:优化输出电压谐波与共模电压性能仿真研究,NPC三电平逆变器改进同步载波调制算法仿
- 基于双馈风力发电机与储能系统的协同并网:风电分布式发电频率支撑及一次调频的MATLAB仿真探究,基于MATLAB Simulink的双馈风力发电机协同并网储能系统一次调频仿真研究 该仿真模型控制源自专
- can自己参考研究的verilog
- 基于MATLAB的凸轮轮廓设计计算与绘图:优化参数及压力角、曲率半径等结果分析,基于Matlab的凸轮轮廓设计与参数优化计算,输出推程与回程压力角及最小曲率半径结果,基于matlab的凸轮轮廓的设计计
- OfficialSite_MobileThunder1.apk
安全验证
文档复制为VIP权益,开通VIP直接复制
![dialog-icon](https://csdnimg.cn/release/downloadcmsfe/public/img/green-success.6a4acb44.png)