II. Characteristic blind note

0 21
I. IntroductionOn an ordinary Wednesday, Xiao Lei received another task to test...

I. Introduction

On an ordinary Wednesday, Xiao Lei received another task to test the xx system of a school.

II. Characteristic blind note

With the account password given by Party A's father, directly log in to the school's one-card system, and after some searching, click on the "lost card query" function point.

II. Characteristic blind note


There is only one function point in it to see if it is to query the lost card.

1741222584_67c8f2b8eabc1cd3f3d22.jpg! small? 1741222585444


Direct single quotation marks, query.

1741222607_67c8f2cf986717f6883c1.jpg! small? 1741222608180


Huh? There is a saying, look at two single quotes.

1741222626_67c8f2e24639defbaea6d.jpg! small? 1741222626712


Yes, 90% of them are injected. Grab a bag and see what happens.

1741222646_67c8f2f673fbf357e2fbb.jpg! small? 1741222647070


wtf? ? ? get off work

1741222677_67c8f315cee9c02e96ea3.png! small? 1741222678508


Just kidding, it's impossible to get off work. Although Xiao Lei doesn't know much about js reverse, Xiao Lei is proficient in SQL injection. Didn't there be an error report before, and the data was directly injected with this feature of error report?

According to the error just reported, Lei has confirmed that it is closed with single quotation marks, and constructed payload.

1'and 1=1/1 and'1'='1Normal and error-free

1741222697_67c8f329df943db8e5fe2.jpg! small? 1741222698420


1'and 1=1/0 and'1'='1Report an error

1741222731_67c8f34b5980bf45adb78.jpg! small? 1741222731837


This is because in some databases (such as some versions of oracle), 0 cannot be used as the denominator.

According to this feature, the user name length of the current database user is directly injected.

1'and 1=1/(n-length(user)) and'1'='1

Try the value of n from 1 to 10 until an error is reported.

Finally, it is determined that the length of the username is 6

1741222747_67c8f35b0ea11d09ada64.jpg! small? 1741222747466


Off work!

1741222997_67c8f4555c30df69463f7.jpg! small? 1741222997764

1741223005_67c8f45db5dffdc8321f4.png! small? 1741223006144


Good, you have successfully caught my attention, Xiao Lei.

Three.js reverse engineering

I was going to be low-key, but now, no more pretense, actually I, xiaolei, am good at JavaScript reverse engineering.' master Wang, help me!'
Master Wang is online, and then I, Ah Wang, will proceed with the JavaScript reverse engineering.

First, Master Wang uses this interface to search for 123456, then capture the data, which is the encrypted form of the data we submitted

1741223031_67c8f4772c901ea1c38c9.jpg! small? 1741223031752


Check the path of the captured packagexxxx/InvokFront

1741223053_67c8f48de33d4577dc446.jpg! small? 1741223054622


Click on 'Sources' -> 'XHR/fetch Breakpoints' and click the plus sign next to it

你可能想看:
最后修改时间:
admin
上一篇 2025年03月30日 03:32
下一篇 2025年03月30日 03:54

评论已关闭