電腦攻防 Project3 = ###### tags: `Course - The Attack and Defense of Computers` ## 小組名單 - 第10組 108502530 曹鈞翔 108502532 丁麒源 108502533 廖宥霖 ## gomai flag共有5個part,將5個part相加後通過base64解碼即可得到flag。 - part 1:在`goami.html`內的```<script type="text/plain">```部分 - part 2:在`style.css`內 - part 3:在cookie - part 4:在`inu.png`的Header - part 5:通過`index.js`的function可得(會節錄`text/plain`中的部分文字,並在網頁滾動數次後於console印出) ## Bocchi Search Tool  ## Monster  密碼是在rockyou.txt搜尋bocchi的第一個結果 ## ISOSTAGRAM SQL-1 目標語句: "SELECT * FROM users WHERE `username` = '$username' AND `password` = '$password';" 輸入: k' UNUNIONION SESELECTLECT '1','kita0421','a';-- 透過包住的方式通過 UNION 和 SELECT 的檢查 再透過UNION SELECT 讓我們打進去的結果回傳 最後用-- 註解掉後面的code 原語句就會變成這樣: "SELECT * FROM users WHERE `username` = 'k' UNUNIONION SESELECTLECT '1','kita0421','a';-- ' AND `password` = '$password';" ## ISOSTAGRAM SQL-2 Database dump. ## Report to Admin ```htmlembedded <iframe %00 src="	javascript:console.log(document.cookie)	"%00> ``` 需使用onload之類的東西才有用。
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up