33-1
// ãã©ã¼ã ã使 document.body.insertAdjacentHTML("beforeend", ` <form id="TEST_FORM" action="https://webhacking.kr/challenge/bonus-6/lv2.php" method="post" > ãã// ãã©ã¡ã¼ã¿ <input name="post" value="hehe" /> <input name="post2" value="hehe2" /> </form> `) // ãã©ã¼ã ãéä¿¡ document.getElementById("TEST_FORM").submit()
33-2
GETãã©ã¡ã¼ã¿ã¼ã®ãã¼ãmyip
ã«è¨å®ãå¤ã¯ãµã¼ãã¼ã®REMOTE_ADDRã§ããã°åé¡ãªãã
REMOTE_ADDR
ã®å¤ã¯ã次ã®ã³ãã³ãã§ç¢ºèªã§ããã
$> ping webhacking.kr PING webhacking.kr (202.182.106.159): 56 data bytes 64 bytes from 202.182.106.159: icmp_seq=0 ttl=52 time=13.164 ms 64 bytes from 202.182.106.159: icmp_seq=1 ttl=52 time=23.832 ms 64 bytes from 202.182.106.159: icmp_seq=2 ttl=52 time=46.848 ms 64 bytes from 202.182.106.159: icmp_seq=3 ttl=52 time=13.757 ms 64 bytes from 202.182.106.159: icmp_seq=4 ttl=52 time=48.526 ms ^C --- webhacking.kr ping statistics --- 5 packets transmitted, 5 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 13.164/29.225/48.526/15.552 ms
https://webhacking.kr/challenge/bonus-6/33.php?myip=202.182.106.159
ããã§æ£è§£ã¨æã£ããéã£ãã
REMOTE_ADDR
㯠ã¦ã¼ã¶ã¼ãã¢ã¯ã»ã¹ãã¦ããIPã¢ãã¬ã¹ã®ãã¨ãªã®ã§ã https://www.cman.jp/network/support/go_access.cgi
ã«ã¢ã¯ã»ã¹ããIPã¢ãã¬ã¹ãåå¾ããã¬ãè¯ãã
âã®æé ã§æ£è§£
33-4
https://webhacking.kr/challenge/bonus-6/l4.php?password=b442e80a17388b2cd9e568da7ca315a1
Challenge 33-4 view-source hint : 1733041724
hintã®å¤ã¯1ç§ãã¨ã«1ã¤å¢ãã¦ãããUNIXã¿ã¤ã ã¹ã¿ã³ããmd5ã§æå·åãããã®ããpasswordã«å ¥ããã°OK
æéãè¿ããªã£ãæã¯ãåèªã¿è¾¼ã¿ãã¿ã³ã飿ããã®ãã³ãã
33-5
<hr> Challenge 33-5<br> <a href=md555.txt>view-source</a> <hr> <?php if($_GET['imget'] && $_POST['impost'] && $_COOKIE['imcookie']) echo "<a href=???>Next</a>"; else echo "Wrong"; ?>
document.cookie = "imcookie=hello; path=/"; // ãã©ã¼ã ã使 document.body.insertAdjacentHTML("beforeend", ` <form id="TEST_FORM" action="https://webhacking.kr/challenge/bonus-6/md555.php?imget=hello" method="post" > ãã// ãã©ã¡ã¼ã¿ <input name="impost" value="hello" /> </form> `) // ãã©ã¼ã ãéä¿¡ document.getElementById("TEST_FORM").submit()
33-6
<hr> Challenge 33-6<br> <a href=gpcc.txt>view-source</a> <hr> <?php if($_COOKIE['test'] == md5($_SERVER['REMOTE_ADDR']) && $_POST['kk'] == md5($_SERVER['HTTP_USER_AGENT'])) echo "<a href=???>Next</a>"; else echo "hint : {$_SERVER['HTTP_USER_AGENT']}"; ?>
document.cookie = "test=13afe819710c524e52d5ba56fb781972; path=/"; document.body.insertAdjacentHTML("beforeend", ` <form id="TEST_FORM" action="https://webhacking.kr/challenge/bonus-6/gpcc.php" method="post" > <input name="kk" value="0845b309c7b9b957afd9ecf775a4c21f" /> </form> `); document.getElementById("TEST_FORM").submit();
33-7
https://webhacking.kr/challenge/bonus-6/wtff.php
119.171.161.124
119171161124
<hr> Challenge 33-7<br> <a href=wtff.txt>view-source</a> <hr> <?php $_SERVER['REMOTE_ADDR'] = str_replace(".","",$_SERVER['REMOTE_ADDR']); if($_GET[$_SERVER['REMOTE_ADDR']] == $_SERVER['REMOTE_ADDR']) echo "<a href=???>Next</a>"; else echo "Wrong<br>".$_GET[$_SERVER['REMOTE_ADDR']]; ?>
?119171161124=119171161124
document.cookie = "test=13afe819710c524e52d5ba56fb781972; path=/"; document.body.insertAdjacentHTML("beforeend", ` <form id="TEST_FORM" action="https://webhacking.kr/challenge/bonus-6/gpcc.php" method="post" > <input name="kk" value="0845b309c7b9b957afd9ecf775a4c21f" /> </form> `); document.getElementById("TEST_FORM").submit();
https://webhacking.kr/challenge/bonus-6/ipt.php?119171161124=119171161124
33-8
https://webhacking.kr/challenge/bonus-6/ipt.php
<hr> Challenge 33-8<br> <a href=ipt.txt>view-source</a> <hr> <?php extract($_GET); if(!$_GET['addr']) $addr = $_SERVER['REMOTE_ADDR']; if($addr == "127.0.0.1") echo "<a href=???>Next</a>"; else echo "Wrong"; ?>
https://webhacking.kr/challenge/bonus-6/ipt.php?addr=127.0.0.1
33-9
<hr> Challenge 33-9<br> <a href=nextt.txt>view-source</a> <hr> <?php for($i=97;$i<=122;$i=$i+2){ $answer.=chr($i); } if($_GET['ans'] == $answer) echo "<a href=???.php>Next</a>"; else echo "Wrong"; ?>
ãããphp online cmdã§å®è¡
<!DOCTYPE html> <html> <body> <?php for($i=97;$i<=122;$i=$i+2){ $answer.=chr($i); } echo $answer ?> </body> </html>
-> acegikmoqsuwy
33-10
<hr> Challenge 33-10<br> <a href=forfor.txt>view-source</a> <hr> <?php $ip = $_SERVER['REMOTE_ADDR']; for($i=0;$i<=strlen($ip);$i++) $ip=str_replace($i,ord($i),$ip); $ip=str_replace(".","",$ip); $ip=substr($ip,0,10); $answer = $ip*2; $answer = $ip/2; $answer = str_replace(".","",$answer); $f=fopen("answerip/{$answer}_{$ip}.php","w"); fwrite($f,"<?php include \"../../../config.php\"; solve(33); unlink(__FILE__); ?>"); fclose($f); ?>
ããããphp online editorã§å®è¡ã
<!DOCTYPE html> <html> <body> <?php $ip = "119.171.161.124"; for($i=0;$i<=strlen($ip);$i++) $ip=str_replace($i,ord($i),$ip); $ip=str_replace(".","",$ip); $ip=substr($ip,0,10); $answer = $ip*2; $answer = $ip/2; $answer = str_replace(".","",$answer); echo $answer; echo "<br/>"; echo $ip; ?> </body> </html>
27553775535
<hr> Challenge 33-10<br> <a href=forfor.txt>view-source</a> <hr> <?php $ip = $_SERVER['REMOTE_ADDR']; for($i=0;$i<=strlen($ip);$i++) $ip=str_replace($i,ord($i),$ip); $ip=str_replace(".","",$ip); $ip=substr($ip,0,10); $answer = $ip*2; $answer = $ip/2; #ip = 5510755107 $answer = str_replace(".","",$answer); #answer = 27553775535 $f=fopen("answerip/{$answer}_{$ip}.php","w"); fwrite($f,"<?php include \"../../../config.php\"; solve(33); unlink(__FILE__); ?>"); fclose($f); ?>
answerip/27553775535_5510755107.php
-> æ£è§£ï¼
page:https://minegishirei.hatenablog.com/entry/2024/12/01/184813