Original link: https://5ime.cn/2022-sd.html
Web
Open the environment comment prompts to access robots.txt
After accessing robots.txt
, you will get two files source.php
and flag.php
. Accessing source.php
prompts post
to pass admin
Just tried the commit and got only 127.0.0.1 can get the flag!!
1 |
|
Simply fuzz
it, add the X-Client-ip
header directly, and get you need post url: http://www.ichunqiu.com
Get a picture after submitting
1 |
|
Image without any echo
We consider a pseudo-protocol to try and get the flag
1 |
|
Also read the topic source code 2333
1 |
|
Misc
Through traffic analysis, it is found that the ip address format of Windows infected by malicious virus is flag{}
172.16.165.165
Through traffic analysis, it is found that the hostname format of Windows infected by malicious virus is flag{}
K34EN6W3N-PC
Through traffic analysis, it is found that the number of vulnerabilities exploited by malicious viruses infected Windows is flag{}
Through the online analysis of the exported HTTP content through the microstep sandbox, two cve
, CVE-2012-0507
and CVE-2014-0569
. He said that they were successfully used, so it should be the latter.
This article is reprinted from: https://5ime.cn/2022-sd.html
This site is for inclusion only, and the copyright belongs to the original author.