Original link: https://5ime.cn/2022-sd.html
Web
Open the environment comment prompts to access robots.txt

After accessing robots.txt , you will get two files source.php and flag.php . Accessing source.php prompts post to pass admin

Just tried the commit and got only 127.0.0.1 can get the flag!!
1 |
|

Simply fuzz it, add the X-Client-ip header directly, and get you need post url: http://www.ichunqiu.com

Get a picture after submitting
1 |
|

Image without any echo

We consider a pseudo-protocol to try and get the flag
1 |
|


Also read the topic source code 2333
1 |
|
Misc
Through traffic analysis, it is found that the ip address format of Windows infected by malicious virus is flag{}
172.16.165.165

Through traffic analysis, it is found that the hostname format of Windows infected by malicious virus is flag{}
K34EN6W3N-PC

Through traffic analysis, it is found that the number of vulnerabilities exploited by malicious viruses infected Windows is flag{}

Through the online analysis of the exported HTTP content through the microstep sandbox, two cve , CVE-2012-0507 and CVE-2014-0569 . He said that they were successfully used, so it should be the latter.
This article is reprinted from: https://5ime.cn/2022-sd.html
This site is for inclusion only, and the copyright belongs to the original author.