storage:writeup

time:2018/4/6


0x01 Wechall writeup

Limited Access

权限限制,限制了GET方法,改用POST或其他请求方式绕过限制

Plaintext code for .htaccess
AuthUserFile .htpasswd AuthGroupFile /dev/null AuthName "Authorization Required for the Limited Access Challenge" AuthType Basic <Limit GET> require valid-user </Limit>

Training: Crypto - Caesar II

明显是ascii码的数字,直接编写脚本,观察输出即可找到password

if __name__ == '__main__':
str = '''XXXXXXXXXXXXXX'''
str = str.split()
for j in range(0, 256):
for i in str:
print(chr((int(i,16)+j)%128), end='')
print()

Impossible n'est pas français

分解质因数,6秒内分解数百位的数字几乎不能实现,但是发现提交错误答案后会返回正确的答案,直接写脚本提交一次错误答案然后获取正确答案再次提交


Training: Crypto - Substitution I

还是凯撒加密,直接用词频分析破解网站


Limited Access Too

还是限制请求方法,除了PATCH其余都被限制了,使用PATCH绕过限制


PHP 0818

考虑ord()函数返回字符串的首个字符的ASCII值,提交3735929054的十六进制


Training: Net Ports

使用curl中 --local-port [端口]命令,校园网可以成功,但是联通网始终无法生效,也许是运营商限制了端口使用


Training: Encodings I

全是0和1先想办法转换成ascii字符,441位除8除不尽,考虑七位分一组,最前加0构造ascii码


Training: Baconian

培根加密,密文只有a和b,一般使用斜体字母为a其余为b,此处可假设大写为a小写为b,每五个ab为一组对应一个字母,U\V和I\J有可能拥有相同编码,先用python解出培根密码再用培根解密


Training: Crypto - Digraphs

字母两两配对替换一个真实字母,猜测第一个单词是congratulations.然后得出一部分密码对应,再逐步解码


Training: Regex

正则表达式的应用,注意正则表达式的前后在这里要加上/再提交,最后一个/^(wechall4?).(?:jpg|gif|tiff|bmp|png)$/


Training: MySQL II

用union直接把构造的账户密码传入


Training: Warchall - The Beginning

level0 was the welcome text:

$ grep solution 0/README.txt //grep搜索获取匹配模式的一行字符

Oh .... and your solution to level0 is: "bitwarrior" without the quotes.

level1 was finding the solution out of various files

$ find 1

gave me a file called SOLUTION.txt

$ grep solution 1/blue/pill/hats/gray/solution/is/SOLUTION.txt

Your solution for this level is: LameStartup

level2 was a hidden file //获取隐藏文件ls -a(显示所有文件目录选项)

$ grep solution 2/.porb/.solution

The solution is HiddenIsConfig

level3 was finding the solution in the bash_history file //.bash_history文件包含了操作历史

$ grep solution 3/.bash_history

The solution to SSH3 is: RepeatingHistory

level4 was chmod the file in your home dir (~) //chmod改变文件的权限

level5 was protecting your home folder:

$ umask 0077 //umask修改初始化文件的默认权限

$ chmod -R 0700 ~

05-23 16:30