2017蓝盾杯第一场wp(不完全)
WEB
WEB-1(WEB签到)
![](https://img.haomeiwen.com/i8351844/e0ba44b9f3e12262.png)
打开链接发现是php代码审计
构造get传user和id值Post传pass值
这里就是php的sha1函数无法处理数组所以构造数组绕过
![](https://img.haomeiwen.com/i8351844/9929202fa78e340f.png)
WEB-2(这不仅仅是web)
打开链接发现
http://364668b968b56759c088a580e4e8d745.yogeit.com:8080/?page=include.php
打开的并不是index.php而是include.php想到文件包含
利用php://filter协议可读出index.php的源码
![](https://img.haomeiwen.com/i8351844/91f1d546071bf65b.png)
Base64解码后
$file = $_GET["page"];
if( isset( $file ) )
include( $file );
else {
header( 'Location:?page=include.php' );
exit;
}
?>
用notepad++打开网站中的文件
在最后发现为杰斐逊密码
![](https://img.haomeiwen.com/i8351844/2cc32554bc8d0fec.png)
解密后得到file字符串
![](https://img.haomeiwen.com/i8351844/05c2e04da16efc0e.png)
网站源代码中
![](https://img.haomeiwen.com/i8351844/a95eeaa9c5f0ffdf.png)
所以推测flag存放在file.txt文件中
再利用文件包含读出file.txt
![](https://img.haomeiwen.com/i8351844/1816b6fe7bfff05d.png)
解码后即得flag
![](https://img.haomeiwen.com/i8351844/aba3e91e704cf687.png)
WEB-3(七环)
在网站的cookie中发现
![](https://img.haomeiwen.com/i8351844/652dd7f0916d2dac.png)
解码后为+AGI-d+AGMAdA-f+AHsAQABiAGw-ue+AEA-d+AG8-n+AEA-edu+AEAAfQ-
![](https://img.haomeiwen.com/i8351844/5045a6eee66c91a9.png)
结合七环 以+号为界因为base64中没有-号 所以将+ -之间的作为base64解码 再分别加上-号后的字符
所以
WEB-4(命令注入)
![](https://img.haomeiwen.com/i8351844/19c1271a56543129.png)
令hello=phpinfo()发现有回显,发现系统为linux
![](https://img.haomeiwen.com/i8351844/c046afea6b0928bd.png)
也是php的代码审计
直接构造payload
?hello=$a);print_r(file("./flag.php"));//
![](https://img.haomeiwen.com/i8351844/e481d3cff8b122b4.png)
MISC
MISC-1(MISC签到题)
打开文件发现是base64编码
![](https://img.haomeiwen.com/i8351844/5d604c6ccfa255c9.png)
解码后得到base32编码的一串字符
![](https://img.haomeiwen.com/i8351844/0c218b2f95d6f462.png)
解码后得到base16编码的一串字符,解码后得到flag
![](https://img.haomeiwen.com/i8351844/1d6a91b732c46d13.png)
MISC-2(就在眼前)
打开word文档发现是Quoted-Printable编码的字符解码后
![](https://img.haomeiwen.com/i8351844/8d5a896d5452106d.png)
放到kali binwalk分析
![](https://img.haomeiwen.com/i8351844/97b73d4af38633d4.png)
包含着许多压缩包
利用-e命令进行解压
解压后在word/document.xml中发现flag
![](https://img.haomeiwen.com/i8351844/2ef0c5b4c1f8cc81.png)
MISC-3(常规杂项)
解压 放到kali中binwalk分析图片 发现隐藏压缩包
![](https://img.haomeiwen.com/i8351844/ddec20734031f03f.png)
Binwalk -e解压出压缩包 发现需要密码
用strings命令查看图片 得到密码的提示
![](https://img.haomeiwen.com/i8351844/fc1d6782e3d67857.png)
进行掩码攻击得到密码
![](https://img.haomeiwen.com/i8351844/5eff5040ec14b5c3.png)
解压后得到flag
![](https://img.haomeiwen.com/i8351844/0c177e091a6a4cea.png)
Reverse
Reverse-1(逆向签到)
下载的文件先拿PEID查看一下,发现有UPX的壳。
![](https://img.haomeiwen.com/i8351844/9a8c53123e02d9d5.png)
首先着手准备脱壳,发现脱壳后需要修复输入表。太麻烦就放弃脱壳了,直接分析。
调用再sub_4011B0
算法sub_401460
分析得到输入233
![](https://img.haomeiwen.com/i8351844/b5e874775532f911.png)