Skip to content

Create 180111-06.md #296

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
23 changes: 23 additions & 0 deletions 笔记/9Team/clm136526/180111-06.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
# Brute Force(暴力破解)
- 1.随便输入账号密码然后抓包
![](https://github.com/clm136526/ctf_web/blob/master/src/%E5%BE%AE%E4%BF%A1%E5%9B%BE%E7%89%87_20180111192733.png?raw=true)
- 2.设置账号密码为参数
- 注:坑爹是自己输入的账号,然后带入密码字典
![](https://github.com/clm136526/ctf_web/blob/master/src/%E5%BE%AE%E4%BF%A1%E5%9B%BE%E7%89%87_20180111192743.png?raw=true)
- 3.感觉这样的破解有点呆,如果字典没正确的话就难搞了

# Command Injection(命令行注入)
- 1.查看源码
![](https://github.com/clm136526/ctf_web/blob/master/src/%E5%BE%AE%E4%BF%A1%E5%9B%BE%E7%89%87_20180111193211.png?raw=true)
## 相关函数
1. stristr函数搜索字符串在另一字符串中的第一次出现,返回字符串的剩余部分(从匹配点),如果未找到所搜索的字符串,则返回 FALSE。参数string规定被搜索的字符串,参数search规定要搜索的字符串(如果该参数是数字,则搜索匹配该数字对应的 ASCII 值的字符),可选参数before_true为布尔型,默认为“false” ,如果设置为 “true”,函数将返回 search 参数第一次出现之前的字符串部分。
2. 这个函数会返回运行php的操作系统的相关描述,参数mode可取值”a” (此为默认,包含序列”s n r v m”里的所有模式),”s ”(返回操作系统名称),”n”(返回主机名),” r”(返回版本名称),”v”(返回版本信息), ”m”(返回机器类型)。
- 2.什么都不输入点击
![](https://github.com/clm136526/ctf_web/blob/master/src/%E5%BE%AE%E4%BF%A1%E5%9B%BE%E7%89%87_20180111193557.png?raw=true)
- 3.发现一堆参数,好像能用来查看很多东西。
- 4.输入1127.0.0.1&&ipcongif查看IP
![](https://github.com/clm136526/ctf_web/blob/master/src/%E5%BE%AE%E4%BF%A1%E5%9B%BE%E7%89%87_20180111194054.png?raw=true)
- 5.可以看到,服务器通过判断操作系统执行不同ping命令。这就能干很多事。。。。。

# 参考自
[](http://www.freebuf.com/articles/web/116714.html)