Jump to content

Featured Replies

Posted

WEB

SQLUP

Open the question and gave a login page to inject SQL with the guess name

1049983-20241008092218396-758395906.png

Check the source code and find that there is a hint prompting the developer to use pattern matching

1049983-20241008092219390-32340352.jpg

So I tried using % to fuzzy match, login succeeded

username=adminpassword=% After entering the panel, I found that there is a file upload function

1049983-20241008092220160-1690588852.png

Try to upload a php file, but the result is waf, and the file name cannot appear p

1049983-20241008092220948-1070441433.jpg

I've thought of using .htaccess file to parse gif files to getshell

Upload the .htaccess file first, and parse 1.gif as php

FilesMatch '1.gif'

SetHandler application/x-httpd-php

/FilesMatch

1049983-20241008092221713-43094018.jpg

Then upload 1.gif file

1049983-20241008092222494-1621144674.jpg

Then access uploads/1.gif to getshell, but you still need to escalate the permission to read the flag

Looking for an order to escalate power

find/-perm -u=s -type f 2/dev/null discovery tac command can be used

1049983-20241008092223231-742831687.jpg

CandyShop

The source code is as follows

import datetime

from flask import Flask, render_template, render_template_string, request, redirect, url_for, session, make_response

from wtforms import StringField, PasswordField, SubmitField

from wtforms.validators import DataRequired, Length

from flask_wtf import FlaskForm

import re

app=Flask(__name__)

app.config['SECRET_KEY']='

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.