CSCAMP 2014CTF|writeup web-7amama Book

We can see the description first:

Description:

7amamaBook is a social media website where people can sign up and share with each other. It has a bug bounty program and you found a bug and reported it but they refuse to pay you so you want to give them a payback by hacking it.

Then I open the webpage(http://178.63.58.69:8082/bounty.php), I find the web manager post something like this:

We don’t pay for CSRF vulnerability.

OK, there must have a CSRF vulnerability on this website. Let’s hack it!
I register a account test233 first. Then user this account to log in this website.
When I check the view-source  of the homepage I find a link: http://178.63.58.69:8082/settings.php
On this page there is nothing to defend the CSRF attack, so we can change anyone’s password as we can.
I also find another very important link: http://178.63.58.69:8082/profile.php?user=7atata
Sorry, you can’t view this post.
This post’s privacy is set to “Only me”</p>

This remind us to update the password of the user 7atata.

And then we get to that page, we find the flag is over there

最近的文章

利用搜索引擎批量抓取url

有的时候爆出0day,我们需要抓取大量的url进行测试,这个时候需要用到搜索引擎,常用的有:google,fofa,shodan下面是整理的利用js对对不同搜索引擎进行批量抓取的代码:fofa: (如何使用:StartReq(搜索语法,开始页码,结束页码) ) <span class="typ">StartReq</span><span class="pun">(</span><span class="str">'bod...…

fofa google search shodan url 搜索引擎继续阅读
更早的文章

大神的脱壳笔记【转】

转自乐乐大神的空间:http://user.qzone.qq.com/179519167/blog/1264251355一.脱壳基础知识要点1.PUSHAD :(压栈) 代表程序的入口点2.POPAD  :(出栈) 代表程序的出口点,与PUSHAD想对应.看到这个,就说明快到OEP了.3.OEP:程序的入口点,软件加壳就是隐藏OEP.而我们脱壳就是为了找OEP.二.脱壳调试过程中辨认快到OEP的简单方法下面二个条件是快到OEP的共同现象:若出现下面情况时,说明OEP就要到了:1. OD跟踪...…

OD 手动 脱壳 逆向继续阅读